Pre-packaged encryption, DDoS and news feed for tech-light jihadists Terrorists are developing and distributing encryption tools that protect privacy of their communications, as well as other homegrown apps that include a news-feed compiler and DDoS attack software, according to a Trend Micro report.The tools have been made to give less tech-savvy members of terror groups the ability to use known technologies without having to trust or invest in commercial products that can perform the same functions, the report says.Some of the tools are still being updated, indicating an active development community among the terrorists.+ MORE HIDDEN GEMS: 15 FREE steganography apps for mobile devices + The availability of the encryption applications adds fuel to the argument that if governments require commercial encryption manufacturers to provide the means to decrypt communications and data made secret by their products, criminals and terrorists will write their own.Here are the tools as identified by Trend Micro: Mojahedeen Secrets: This encryption package has been around since 2007 and is used to secure email using RSA public/private key encryption. It also can delete emails and files without leaving a trace that can be recovered.Tashfeer al-Jawwal: This encryption app was made for mobile devices and has been in circulation since 2013. Author: Global Islamic Media Front.Asrar al-Dardashah: This is an encryption plugin to secure the Pidgin instant messaging platform.Amn al-Mujahed: Another messaging encryption app, this can be applied to email, SMS and instant messaging. It’s been around since 2013 and is still being updated by its developers.Alemarah: This is a new app for Android that distributes news about terror-related activities that can include Web sites and calendars as well as news feeds.Amaq v 1.1: Another Android app, this is widely used to spread information among terrorists. There is a newer version, Amaq 2.1, that adds a feature that makes it easy to change the URL where it is hosted to keep it available if the current site is taken down. Terrorists continue to develop other apps. For example, during Trend Micro’s study of terrorist tools, researchers ran across a rudimentary DDoS app that employs SYN floods. “While this application is not particularly advanced, it shows that there is active exploration into disruptive technology,” the Trend Micro report says. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe