Jewish News
1.41K subscribers
6.94K photos
3.61K videos
498 files
15.8K links
Live stream of news headlines, with multimedia and educational paragraphs.

WhatsApp: https://s.z9network.com/JewishNewsWAG1

Discussion Group: @DiscussTheNews

Feedback & advertising: @Z9FeedbackBot

Directory: @Z9Network

Website: www.Z9Network.com
Download Telegram
House passes legislation to renew key #NSA surveillance program after #DonaldTrump’s contradictory tweets

https://goo.gl/NGzHSG
#MD: One person wounded in shooting at entrance to #NSA headquarters

https://goo.gl/JWLoCP
Wrong turn? Authorities try to narrow causes of #NSA security scare at Fort Meade

https://goo.gl/FNZT2Z #VA
#NSA dumps millions of phone records collected by telecom companies

s.z9network.com/2tFRgVE
Stolen NSA hacking tools were used in the wild 14 months before Shadow Brokers leak

On of the most significant events in computer security came in April 2017, when a still-unidentified group calling itself the Shadow Brokers published a trove of the National Security Agency’s most coveted hacking tools. The leak and the subsequent repurposing of the exploits in the WannaCry and NotPetya worms that shut down computers worldwide made the theft arguably one of the #NSA’s biggest operational mistakes ever.

On Monday, security firm Symantec reported that two of those advanced hacking tools were used against a host of targets starting in March 2016, fourteen months prior to the Shadow Brokers leak. An advanced persistent threat hacking group that Symantec has been tracking since 2010 somehow got access to a variant of the NSA-developed DoublePulsar backdoor and one of the Windows exploits the NSA used to remotely install it on targeted computers.