Well, can we say schadenfreude? The hunter becomes the hunted.
Singapore’s connection to the Hacking Team – it’s well known that HT has a Singapore presence. The local market appears to be quite receptive of them. In one of the leaks, it was revealed that they also tried to recruit local researchers to develop 0-day for them.
In April of 2014, Hacking Team attended the SyScan conference in Singapore with the intention of recruiting new exploit developers.
They succeeded in making contact with several researchers interested in working with them, including Eugene Ching.
Interestingly, Eugene’s responsibility with the Singaporean Army, presumably for his mandatory service, is to test and fix 0day exploits that they purchase.
Read more details here.
The leakage of OPM data has been well-reported but this article provides more details about how it happened. In the worse case, “personal details from nearly everyone who works for the government in some capacity may now be in the hands of a foreign government”.
Good grief! Has no one learned from Sony’s rootkit incident yet? If you are a Lenovo owner, you may want to check if there’s a Superfish certificate in your certificate chain by running certmgr.msc. Other than injecting unwanted ads in your browser, in theory the adware could sniff on your banking transactions ‘cos it’s performing a MiTM on your HTTPS.
An alarmist or realist view of where society is headed in terms of increasing loss of privacy and control? Read and judge for yourself.
It’s amazing how advanced the online ads business have gotten. This is the current state as of 2014. I’m sure it will evolve even more as we progress (or some will say regress).