destroy ugly, create beautiful

allowing good while stopping the bad

Hippogriff takes pride in having the skills available to protect and promote the Human Right to privacy. Illegal actions against individuals and companies are not only carried out by criminal cells, but also state-sponsored agencies and their non-governmental contracted propagators. Hippogriff is able to grant System Protection, Continuity, and Contingency Planning - along with Network Security Testing and Evaluation capabilities to slow down and make unlawful espionage against innocents more difficult. Legitimate business operations are being affected by such revelations; this means profits will continue to be hampered if economic activity isn't left alone by the misuse of information technology systems.

Hippogriff is available to fill the demand of exponential technological growth; a need for Cyber Security services is paramount. Too many companies are unaware of the dangerous that await them as they navigate the global economy. Most organizations at this time are infected at different levels of their network infrastructure. Most organizations employ an ill-equipped internal IT department or outsourced IT services that DO NOT specialize in the areas that Hippogriff is currently assisting in. The future will be even more hectic than things are now. Make sure your organization's systems are prepared to deal with emerging threats and changes to infrastructure.


E.U. Lawmakers Back Exports Control on Spying Technology

E.U. lawmakers overwhelmingly backed plans on Thursday to control exports of devices to intercept mobile phone calls, hack computers or circumvent passwords that could be used by foreign states to suppress political opponents or activists.

Members of the European Parliament's trade committee voted by 34 votes to one in favor of a planned update to export controls on "dual use" products or technologies.


The Police Can Search Your Email Without Yelling You. That's Nuts.

So much of our lives today are conducted online that it's essential that we know who has access to our information. And that's especially true when it's the government that's doing the prying into our emails, texts, and Facebook updates.

A recent case, in which Facebook acted in the perhaps surprising role of advocate for the ordinary citizen — two cheers for Mark Zuckerberg — made clear just how hard the government is working to hide its investigation of citizens' activities online.

Facebook, Verizon, and similar companies get tens of thousands of secret requests apiece from the government for information ostensibly needed to investigate crimes. But citizens and civil rights groups are left largely in the dark about these requests.


Android Phones Still Track You When Location Services Are Off

Many people realize that smartphones track their locations. But what if you actively turn off location services, haven't used any apps, and haven't even inserted a carrier SIM card?

Even if you take all of those precautions, phones running Android software gather data about your location and send it back to Google when they're connected to the internet, a Quartz investigation has revealed.


China's Insidious Surveillance Army: The Internet of Things

The headline alone is terrifying: "Surveillance cameras made by China are hanging all over the U.S." Scarier still, it's true — the Chinese government owns a 42 percent stake in Hikvision, one of the world's largest manufacturers of cameras and other video surveillance equipment. Its products are used at public sites and private companies around the world, including multiple U.S. government facilities.

It's easy to extrapolate some bleak scenarios based on this information: could the Chinese government be building "back doors" into Hikvision systems to facilitate state-sponsored snooping on sensitive American sites? The company vigorously denies this possibility, though it brings up echoes of 2012 when Chinese tech firms Huawei and ZTE landed in hot water for potentially threatening U.S. national security.


Drone-Maker DJI Offers Bug Bounty Program, then Threatens Bug-Finder with the CFAA

Far too many companies and industries out there seem to think that the best way to handle a security researcher finding security holes in their tech and websites is to immediately begin issuing threats. This is almost always monumentally dumb for any number of reasons, ranging from the work these researchers do actually being a benefit to these companies issuing the threats, to the resulting coverage of the threats making the vulnerabilities more widely known than they would have been otherwise.

But drone-maker DJI gets special marks for attacking security researchers, having decided to turn on one that was working within the bug-bounty program it had set up.


Aadhaar Data Leak: 210 Gov't Websites Publicly Revealed Citizens' Private Details, Reveals RTI Query

Even though the government has framed stringent rules to curb illegal access and displaying of Aadhaar details in public domain, a new report has emerged that the central and state-run websites have themselves blatantly leaked the private details of the Indian citizens who enrolled for Aadhaar.

In a Right to Information (RTI) query, Aadhaar generator body Unique Identification Authority of India (UIDAI) has admitted that around 210 state and central government websites, in their bid to showcase benefits of owning Aadhaar ID, have revealed personal details of the beneficiaries. It is not known when these lapses took place, but those web-pages have been blocked.