ICNA

Iranian Cyber News Agency

Guest Article

Privacy vs Anonymity

Guest written by Laurtis Vestergaard In the first post of our series on setting up VPNs we covered the basics of how to set up a VPN what equipment is needed. If you missed it you can read it here….

How to set up a VPN

Guest written by: Laurtis Vestergaard In these next series of blogs, we will walk you through the various methods on how you can set-up a commercial VPN or create your own for secure online browsing. Previously we have looked at…

Pegasus Spyware and the commercialization of spying

Guest written by: Laurrits Vestergaard   Spying on personal communications is not new, it has been undertaken by governments for decades. However, the discovery of the extent of use of the Pegasus spyware in 2016 and subsequent research by Citizen…

What actually is a strong password?

Guest written by: Laurits Vestergaard What actually is a strong password? Increasingly our lives are online, thought innumerable online accounts all of which require a password. There are constant stories of data breaches and hacks where hackers have taken advantage…

Predatory Sparrow Cyber group attacks Iranian Steel Companies

Guest written by: Jamshid Sani CISP   A hacking group called Predatory Sparrow has claimed responsibility for a recent cyber-attack which allegedly targeted three Iranian steel companies. In social media posts on Monday 27 June 2022, the group named Khuzestan…