1.0Citi 97.3 FM - Relevant Radio. Alwayshttps://citifmonline.comwp-needuserhttps://citifmonline.com/author/wpsupp-user/Analysis of North Korea's computer system reveals spy files - Citi 97.3 FM - Relevant Radio. Alwaysrich600338<blockquote class="wp-embedded-content" data-secret="28HSO9BLUZ"><a href="https://citifmonline.com/2015/12/analysis-of-north-koreas-computer-system-reveals-spy-files/">Analysis of North Korea’s computer system reveals spy files</a></blockquote><iframe sandbox="allow-scripts" security="restricted" src="https://citifmonline.com/2015/12/analysis-of-north-koreas-computer-system-reveals-spy-files/embed/#?secret=28HSO9BLUZ" width="600" height="338" title="“Analysis of North Korea’s computer system reveals spy files” — Citi 97.3 FM - Relevant Radio. Always" data-secret="28HSO9BLUZ" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"></iframe><script type="text/javascript"> /*! This file is auto-generated */ !function(c,d){"use strict";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(/[^a-zA-Z0-9]/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),n=d.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),o=new RegExp("^https?:$","i"),l=0;l<n.length;l++)n[l].style.display="none";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute("style"),"height"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if("link"===t.message)if(s=d.createElement("a"),a=d.createElement("a"),s.href=r.getAttribute("src"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener("message",c.wp.receiveEmbedMessage,!1),d.addEventListener("DOMContentLoaded",t,!1),c.addEventListener("load",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf("MSIE 10"),a=!!navigator.userAgent.match(/Trident.*rv:11\./),i=d.querySelectorAll("iframe.wp-embedded-content"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute("data-secret")))r=Math.random().toString(36).substr(2,10),t.src+="#?secret="+r,t.setAttribute("data-secret",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute("security"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:"ready",secret:r},"*")}}}}(window,document); </script> http://4cd.e16.myftpupload.com/wp-content/uploads/2015/12/nk.jpg600337The first in-depth analysis of North Korea’s internal computer operating system has revealed spying tools capable of tracking documents offline. Red Star OS was designed to superficially mimic Apple’s OS X, but hidden features allow it to watermark files and tie them to an individual. The covert tools were discovered by two German researchers who […]