cryptocurrency, cybercrime, north korea, dprk

Report: N. Korean hacking group increasing efforts to steal cryptocurrency

Lazarus, a North Korean hacking group, is reportedly ratcheting up its efforts to steal cryptocurrency amid North Korea’s economic difficulties due to the COVID-19...
smartphone

North Korea launches new smartphone: the Pyongyang 2428

North Korea has launched a new iteration of its “Pyongyang” series smartphone, the Pyongyang 2428, Daily NK sources reported on Apr. 4.  The new phone...

N. Korea’s new “spectrum analyzer” may be a surveillance tool

North Korea has allegedly developed its own version of what is called a “spectrum analyzer.” Daily NK sources suspect that the device, which was...
sinuiju recalled espionage

Chinese authorities expand 5G technology on border with North Korea

Dandong is the latest city in China to receive a 5G-equipped checkpoint aimed at cracking down on smuggling and defections along the Sino-North Korea...

State security employees issued smartphones with voice encryption technology

North Korea’s legal authorities have issued Ministry of State Security (MSS) employees with smartphones that encrypt voice calls, North Korean sources told Daily NK...

Younger North Koreans turn to technology to share information

A dictionary of IT terminology installed in the North Korean smartphone 'Arirang 151' is said to be popular among younger North Koreans. Image: Daily NKUnification...

State researcher looks to market economy to apply newly developed technology

A North Korean scientist working at a top national defense and science research institute has invented a machine that can reportedly identify the causes...

Residents call state bluff on tablet technology

The "Myohyang" tablet (left). Kim Il Sung's birthday absent on the tablet's calendar application (right).The tablet computer "Myohyang," lauded in North Korean state media...

New Technology Employed to Track Intl. Calls

Image: Yonhap News AgencyNorth Korea has employed new state-of-the-art devices in order to increase the efficacy of mobile monitoring and detection to preclude information from leaking...

Recent Articles