Make me invisible

Creating new malware


It’s not easy to ‘write’ a new malware that is able to evade the detection of antimalware and other defensive software, but it is easier to ‘produce’ a new malware that can evade the detection of antimalware solutions. The difference between writing and producing is very subtle and stands in the fact that in the […]

Not the Apple of your eye


Every time you type a number into your iPhone for a text conversation, the Messages app contacts Apple servers to determine whether to route a given message over the ubiquitous SMS system, represented in the app by those déclassé green text bubbles, or over Apple’s proprietary and more secure messaging network, represented by pleasant blue […]

Signal Desktop


Signal already offers the best way to send secure and privacy conscious messages on Android and iOS, and now, an update offers everyone the opportunity to use Signal on the desktop. Why they call it a desktop app if it’s a Chrome extension? Yeah, it’s a bit misleading. Also it’s technically a Chrome app, not […]

New Opera browser


Opera is a web browser developed by Opera Software. The latest version is available for Microsoft Windows, OS X, and Linux operating systems, and uses the Blink layout engine. Now with a built-in ad blocker and free VPN. Opera, Portable Edition is a lightweight, customizable browser designed for speed. It’s the popular Opera™ web browser […]

How Police Trace Cellphones


A cellphone is one of the most trackable devices under the eye of American law enforcement. “Buying a burner phone correctly isn’t easy,” says Nicholas Weaver, a security- and privacy-focused computer science researcher at Berkeley University, referring to the pre-paid phones often used by criminals and terrorists. A phone carrier technique called a tower dump, […]

Tor and VPN routers


In our contemporary modern surveillance world, the traditional centralized VPN server model, I would argue, has become maybe a little challenged … if what people want is true privacy and surveillance avoidance, the concern is that this is not unlike the trouble that Tor exit nodes are known to have … We know that intelligence […]

Tracking EXIF data


What many people are unaware of is that most digital cameras, and smartphones, that shoot in JPG or TIFF formats write information on where a photograph was taken, when, and the camera used, every time the virtual shutter opens. That data is written in the “exchangeable image file format” (EXIF) standard. Criminals have started to […]

The back door to your Android


Do you own an Android Smartphone from Xiaomi, HTC, Samsung, or OnePlus? If yes, then you must be aware that almost all smartphone manufacturers provide custom ROMs like CyanogenMod, Paranoid Android, MIUI and others with some pre-loaded themes and applications to increase the device’s performance. But do you have any idea about the pre-installed apps […]

Vanish © 2016 Frontier Theme