Turkish Hacking Group Cyber Warrior’s e-Magazine : TeknoDE

Cyber Warrior is one of the biggest hacker groups in Turkey. The group was established in 1999. Their first significant cyber-attack was in 2003, when they launched a massive operation against 1,500 U.S. websites in protest against the American invasion of Iraq and a specific incident where Turkish military personnel in northern Iraq were captured and interrogated by the U.S. Army.

Turkish Hacking Group Cyber Warrior
Turkish Hacking Group Cyber Warrior

Cyber Warrior (CW) comprises teams for strategy, intelligence, logistics, R&D and a dedicated unit for waging cyber-attacks named Akincilar. In recent weeks, for examples, Akincilar has attacked official government websites of countries that discriminate against their Muslim populations, in their opinion.

Additionally, CW has been active developing cyber tools and improving others. They even write instructional manuals on cyber security and have established a Cyber Academy, where they provide online training.

In September 2014, the group published their first monthly e-Magazine. The magazine is published on their online platforms and it includes cyber news items from the IT world, new technologies, cyber security, hacking news, programming and more.

September 2014 issue of TeknoDE
September 2014 issue of TeknoDE

In their first issue, they featured a cryptography contest with the top prize of a book, mug and mouse pad.

Cryptography Contest
Cryptography Contest

In their October issue, they reviewed the recently discovered Shellshock vulnerability, shared information on how to locate a lost mobile phone and discussed ways to hack into Gmail accounts, and aircraft and satellite systems.

October 2014 issue of TeknoDE
October 2014 issue of TeknoDE

A couple of weeks ago, they produced the November 2014 issue, featuring articles about credit card frauds, new Android malware and interviews with Cyber Warrior founders.

November 2014 issue of TeknoDE


Currently, the magazine is in Turkish and it increases awareness of the Cyber world for users, while promoting an interest in cyber security among them.

Members of the website and readers of CWTeknoDE will not only be motivated to hack, but with this magazine they will have chance to learn more about the cyber world, and methods and vulnerabilities.

Related Posts

Did Turkish Hackers Actually Hack the Israeli “Iron Dome”? on August 18, 2014 by Sheila Dahan

Turkish Government Bans Twitter and Hijacks IP Addresses for Popular DNS Providers on March 31, 2014 by Sheila Dahan

RedHack – A Turkish Delight on February 5, 2014 by Sheila Dahan

Insights from the CyberTech 2014 Conference

It’s time to say congratulations – SenseCy was officially launched this week at the CyberTech 2014 Conference!

Our Website is online and registration to our News Feed and Intelligence Feeds is open; Visit us at www.sensecy.com

We had the pleasure of exhibiting at this conference, which brought together over 8,000 visitors from nearly 50 countries, and was sponsored by all the industry’s leading vendors. The event also hosted about 50 start-up companies and provided them with a platform to share their innovative products with would-be investors (as one foreign visitor told me – this was the highest concentration of IT Sec per square meter he has ever witnessed, and I tend to agree). We were even lucky enough to have our co-founder and VP Cyber Solutions Mr. Assaf Keren invited to speak at the main assembly about the recent breach of the IDF security systems.

Here are a few of my insights from this event:

  • The industry is trying to find next-generation solutions; almost every booth featured the word “New”, “Innovative” or “Next-Gen”. Other than the usual marketing hype, I perceive this as a genuine effort to try and create better, more holistic solutions, which stems from the realization that current solutions are lacking.
  • Creativity – this is especially true for the start-up scene, where dozens of start-ups are focusing on addressing problems in innovative ways, and creating solutions for problems that did not exist a year or two ago. It is too early to say which of these technologies will prevail, but looking at the recent funding some of these companies have received, it is a safe bet they will bring their products to the market very soon.
  • Need for PPP – the need for PPP (or Private Public Partnership, or at least collaboration) initiatives was never clearer than it is when discussing cybersecurity. It is blatantly obvious that governments cannot provide security for the business sector, but, throughout collaboration, they can assist this sector in being better prepared to mitigate evolving threats (through information sharing and joint development).
  • Need for intelligence – almost every speaker highlighted the need for better, timely intelligence. It is simply not possible anymore to rely on static defense without being aware of what the adversaries are planning and developing.

The one issue I found concerning was that this event (and many others like it, although for the most part participation was free of charge) was very much industry-inclusive, with insufficient public exposure and participation. Certainly, non-IT folks care  little about new malware detection tools, but they should care a great deal about the dangers that point-of-sale (POS) malware generate and should at least try to become more educated about these threats. Perhaps there is a need for other types of events where the general public feels more welcome to come and learn, and the industry should definitely embrace and promote this notion.

All in all, a great event and especially joyous for us here at SenseCy!

Cyber Security – Not Just Another Buzzword

The technology industry loves buzzwords, and its offspring, the IT industry, is no different: “Cloud computing”, “Big data”, “Analytics”, “XX-As-a-Service (XaaS)”… it seems that some marketing wizard invents a new phrase and almost instantly the industry adopts it and uses it to such an extent that within months it has become a trend, and everybody follows suit, adapting their offerings accordingly. Then comes the day when somebody else invents a new, sexier phrase, and everything shifts again. Most of the time it is hard to assess whether the new trend is actually meaningful as such and will establish itself as mainstream or even core of technology, or is it simply being delighted in as a novelty, soon to be forgotten? The side effect of this cycle is that people in the industry are tiring of buzzwords and are becoming more and more skeptical when “The new, innovative concept” is marketed to them. The general public is even less interested – most only care about new technologies and concepts when they have been proven and incorporated into fully productized gadgets and applications.

And now, following the widely publicized breaches of large retail chains, everyone is talking about Cyber Security, and the question arises – is this just one more buzzword?  Not at all, but some mistake it to be so, for several reasons.

First of all, although it appears to be a very young industry, cyber security is not new at all. In fact, it has been incorporated into our lives for over two decades, but under different names – information security, anti-virus etc.

Secondly, it is not a single-faceted industry but a very diverse one comprising older segments – encryption, anti-virus, firewall etc., as well as newer ones: mobile, biometric identification and intelligence.

Although many startups are developing new products, the market as a whole is mature and profitable. The general notion is that cyber companies are run by 20-something-year-olds in their garages, while in fact the young enterprises are fully seeded companies with solid business plans, and the larger companies are huge multinationals (and since the market is consolidating, there are now fewer but much larger players).

So why is it that this vast industry appears so young that it can be mistaken for a passing trend?

In absolute terms, it is relatively young – established in the 1980’s (although by technology standards it can be considered old, much older than the mobile or cloud technologies that it protects today). Also, up until the latest “rebranding”, it was not something most people noticed. IT security sounds boring, and because everything functioned smoothly, no-one worried about how the encryption worked or how viruses were stopped. Fast-forward to today and every news item seems to be entangled in cyber: Snowden and the NSA, the Adobe breach, the Target breach, the international arms race between the U.S., China and Russia – all involve cyber. And since the adoption of Internet and mobile technology, we are all much more exposed to the threat emanating from this world – be it the theft of our personal details or the monitoring of our online activities by various entities. And here’s the good part – the industry is not idle. In fact, it acknowledges the need to evolve to mitigate evolving threats and it is doing so at an extremely rapid pace, trying to come up with solutions for securing things that were not even dreamed of when the first anti-virus was developed. So no, this whole “Cyber” thing is definitely not just another trend. It is here to stay and will accompany us for many years to come. And that is a good thing – since the cybercriminals of the world are DEFINITELY here to stay.