Vanish

Make me invisible

Proxy or VPN?

vpn

Both VPN (Virtual Private Networks) and proxy servers were designed to keep you anonymous on the internet and help you access websites and services that are not available to everyone because of censorship or various restrictions. Both proxies and VPNs have advantages and disadvantages and some are better than others in certain situations. Do you […]






Review: ProtonMail

email

ProtonMail is an email service developed by a team of scientists who met while working at the European Organization for Nuclear Research (CERN) in Switzerland. The idea behind ProtonMail is to provide an easy to use email service with built-in end-to-end encryption and state-of-the-art security features. ProtonMail appeared in June 2014 on crowdfunding platform Indiegogo. […]






How safe is sms for 2FA?

2FA

Since 2FA became the norm for web services that care about securing your accounts, it’s started to feel like a security blanket, an extra layer keeping your data safe no matter whether your password is as strong as 8$&]$@I)9[P&4^s or as dumb as dadada. But a two-factor setup—which for most users requires a temporary code […]






The GoToMyPC incident

question-mark-150x150

There are two approaches for remotely controlling a computer, calling out and dialing in. RealVNC and Microsoft’s Remote Desktop are examples of the dialing in approach. People not wanting to deal with firewalls and port forwarding, can chose software, such as GoToMyPC that, like ET, phones home. This takes advantage of the fact that firewalls, […]






A face in the crowd

Face-Detection-FBI

In the last few years, several groups have announced that their facial recognition systems have achieved near-perfect accuracy rates, performing better than humans at picking the same face out of the crowd. But those tests were performed on a dataset with only 13,000 images—fewer people than attend an average professional U.S. soccer game. What happens […]






Comparing Secure Messaging Apps

cellx150x150

In April, the world’s most popular messaging service, WhatsApp, announced it would use end-to-end encryption by default for all users, making it virtually impossible for anyone to intercept private WhatsApp conversations. Then in May, tech giant Google announced a brand new messaging app called Allo that also supports end-to-end encryption. Making the news even better […]






Targeting LTE Cellphones

cellx150x150

LTE is a more advanced mobile network but not absolutely secure. In this presentation, we will introduce a method which jointly exploits the vulnerabilities in tracking area update procedure, attach procedure, and RRC redirection procedure in LTE networks resulting in the ability to force a targeted LTE cellphone to downgrade into a malicious GSM network where […]






Exploit Kits: Hunting the Hunters

vanish.22

Exploit kits are one of the threats that is ever present on the Internet. Indiscriminately compromising users that are simply surfing websites. As ransomware has exploded so has the proliferation of these exploit kits. This combination of ransomware, tor, and bitcoin has created a financially lucrative monster. One of the challenges with investigating exploit kits […]






The curious tale of Ethereum

hacked

On 17 June, a hacker rocked the digital currency world by exploiting a security vulnerability in a non-hierarchical collective Ethereum investment fund, stealing $53m (£36m) in digital currency. After a usual cyberattack, this would be the end of the story, with the victims left to grieve their losses. However, nothing is ever simple in the […]






Silent OS 3.0 for Blackphone

cellx150x150

Silent OS 3.0 With the porting of Silent OS 3.0 to Android M, we are embracing the latest new features brought in the platform such as the runtime data access permissions control or increased battery life. However, this upgrade goes beyond just that and brings several improvements in the scope of privacy and usability. The three […]






‘Hack the Pentagon’ results

hacked

When the Pentagon announced the “Hack the Pentagon” event back in March, many wondered what kinds of vulnerabilities hackers would find when checking government websites for bugs. Now we know. According to Defence Secretary Ash Carter, more than 250 participants out of the 1400 submitted at least one vulnerability report, with 138 of those vulnerabilities […]






Vanish © 2016 Frontier Theme