Hacker News
- “Equation Group” ran the most advanced hacking operation ever uncovered http://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/ 362 comments
- Excellent rundown of how NSA gets its files on your computer and how you will never be able to stop them. http://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/ 27 comments privacy
- Has Mozilla considered building a Next-Gen Kernel in Rust? http://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/ 9 comments rust
- How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last http://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/ 6 comments india
- How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last http://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/ 246 comments sysadmin
- How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last http://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/ 3 comments netsec
- How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last | Ars Technica http://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/ 13 comments technology
Linking pages
- Researchers crack open unusually advanced malware that hid for 5 years | Ars Technica http://arstechnica.com/security/2016/08/researchers-crack-open-unusually-advanced-malware-that-hid-for-5-years/ 1113 comments
- New leak may show if you were hacked by the NSA | Ars Technica http://arstechnica.com/security/2016/10/new-leak-may-show-if-you-were-hacked-by-the-nsa/ 230 comments
- New smoking gun further ties NSA to omnipotent “Equation Group” hackers | Ars Technica http://arstechnica.com/security/2015/03/new-smoking-gun-further-ties-nsa-to-omnipotent-equation-group-hackers/ 107 comments
- Top German official infected by highly advanced spy trojan with NSA ties | Ars Technica http://arstechnica.com/tech-policy/2015/10/top-german-official-infected-by-highly-advanced-spy-trojan-with-nsa-ties/ 36 comments
- NSA-leaking Shadow Brokers lob Molotov cocktail before exiting world stage | Ars Technica http://arstechnica.com/security/2017/01/nsa-leaking-shadow-brokers-lob-molotov-cocktail-before-exiting-world-stage/ 32 comments
- WannaCry About Business Models – Stratechery by Ben Thompson https://stratechery.com/2017/wannacry-and-the-power-of-business-models/ 30 comments
- Cisco confirms NSA-linked zeroday targeted its firewalls for years | Ars Technica http://arstechnica.com/security/2016/08/cisco-confirms-nsa-linked-zeroday-targeted-its-firewalls-for-years/ 20 comments
- New exploit leaves most Macs vulnerable to permanent backdooring | Ars Technica http://arstechnica.com/security/2015/06/new-remote-exploit-leaves-most-macs-vulnerable-to-permanent-backdooring/?amp%3Butm_campaign=feed%3A+arstechnica%2Ftechnology-lab+%28ars+technica%3A+technology+lab%29&%3Butm_medium=feed 20 comments
- Password cracking experts decipher elusive Equation Group crypto hash | Ars Technica http://arstechnica.com/security/2015/02/password-cracking-experts-decipher-elusive-equation-group-crypto-hashes/ 14 comments
- It Looks Like the NSA Just Got Hacked – Mother Jones http://www.motherjones.com/politics/2016/08/nsa-tools-apparently-hacked 8 comments
- We need open-source firmware – Upon 2020 http://upon2020.com/blog/2015/02/we-need-open-source-firmware/ 7 comments
- Stepson of Stuxnet stalked Kaspersky for months, tapped Iran nuke talks | Ars Technica http://arstechnica.com/security/2015/06/stepson-of-stuxnet-stalked-kaspersky-for-months-tapped-iran-nuke-talks/ 6 comments
- How hackers could attack hard drives to create a pervasive backdoor | Ars Technica http://arstechnica.com/information-technology/2015/02/how-hackers-could-attack-hard-drives-to-create-a-pervasive-backdoor/ 4 comments
- NSA 'Cyber Weapons' Leak Shows How Agency Prizes Online Surveillance Over Online Security http://reason.com/archives/2016/08/30/shadow-brokers-nsa-exploits-leak 4 comments
- Hacking group auctions 'cyber weapons' stolen from NSA | Hacking | The Guardian https://www.theguardian.com/technology/2016/aug/16/shadow-brokers-hack-auction-nsa-malware-equation-group 3 comments
- After NSA hacking exposé, CIA staffers asked where Equation Group went wrong | Ars Technica https://arstechnica.com/security/2017/03/after-nsa-hacking-expose-cia-staffers-asked-where-equation-group-went-wrong/ 2 comments
- New exploit leaves most Macs vulnerable to permanent backdooring | Ars Technica http://arstechnica.com/security/2015/06/new-remote-exploit-leaves-most-macs-vulnerable-to-permanent-backdooring/ 1 comment
- Shadow Brokers threaten to unleash more hacking tools | Hacking | The Guardian https://www.theguardian.com/technology/2017/may/17/hackers-shadow-brokers-threatens-issue-more-leaks-hacking-tools-ransomware 0 comments
- “How do I stop this virus?” Equation Group victim pleaded for online help | Ars Technica http://arstechnica.com/security/2015/02/how-do-i-stop-this-virus-equation-group-victim-pleaded-for-help-online/ 0 comments
- New exploit leaves most Macs vulnerable to permanent backdooring | Ars Technica http://arstechnica.co.uk/security/2015/06/new-remote-exploit-leaves-most-macs-vulnerable-to-permanent-backdooring/ 0 comments
Linked pages
- Confirmed: US and Israel created Stuxnet, lost control of it | Ars Technica http://arstechnica.com/tech-policy/2012/06/confirmed-us-israel-created-stuxnet-lost-control-of-it/ 2734 comments
- Photos of an NSA “upgrade” factory show Cisco router getting implant | Ars Technica http://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/ 1565 comments
- Crypto breakthrough shows Flame was designed by world-class scientists | Ars Technica http://arstechnica.com/security/2012/06/flame-crypto-breakthrough/ 635 comments
- Puzzle box: The quest to crack the world’s most mysterious malware warhead | Ars Technica http://arstechnica.com/security/2013/03/the-worlds-most-mysterious-potentially-destructive-malware-is-not-stuxnet/ 31 comments
- https://securelist.com/files/2015/02/Equation_group_questions_and_answers.pdf 13 comments
- Confirmed: Flame created by US and Israel to slow Iranian nuke program | Ars Technica http://arstechnica.com/security/2012/06/flame-malware-created-by-us-and-israel/ 12 comments
- Researchers Uncover Government Spy Tool Used to Hack Telecoms and Belgian Cryptographer | WIRED http://www.wired.com/2014/11/mysteries-of-the-malware-regin/ 1 comment
- Highly advanced backdoor trojan cased high-profile targets for years | Ars Technica http://arstechnica.com/security/2014/11/highly-advanced-backdoor-trojan-cased-high-profile-targets-for-years/ 0 comments
- How digital detectives deciphered Stuxnet, the most menacing malware in history | Ars Technica http://arstechnica.com/tech-policy/2011/07/how-digital-detectives-deciphered-stuxnet-the-most-menacing-malware-in-history/ 0 comments
- https://nex.sx/blog/2015-01-27-everything-we-know-of-nsa-and-five-eyes-malware.html 0 comments
Would you like to stay up to date with Rust? Checkout Rust
Weekly.
Related searches:
Search whole site: site:arstechnica.com
Search title: How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last | Ars Technica
See how to search.