Occasionally fuckups happen, even with Qubes (although not as often as some think). What should we – users or admins – do in such a situation? Patch, obviously. But is that really enough? What good is patching your system if it might have already been compromised a week earlier, before the patch was released, when […]
To get any of your information, it’s as easy as typing your email on Google and waiting for the results. Hackers and big companies alike can track you in many different ways – from stocking your photos to studying your check-in, to display customised advertisements on your social media pages. In short, these companies and […]
While the rampage of ransomware was the attention-grabbing story of last year, the subtitle for 2016 was comprised of just three words: Internet of Things. Four words if you precede “things” with the almost obligatory “Insecure”. That connected devices are of interest to hackers — and connectivity is all we’re really talking about when we […]
The Federal Government’s Metadata Retention Scheme has now become compulsory for telcos and internet service providers in Australia. This means your metadata – including text messages, location information and internet connection details – will be stored for two years and available to Government agencies to access on request without a warrant. There are over five […]
The latest online malware, dubbed Brickerbot, is particularly nasty, as it virtually destroys vulnerable devices. This new approach has led to a new term, PDoS, for Permanent Denial of Service. Hacked devices don’t go up in smoke, but the software on the devices is almost entirely wiped out. For most people, most of the time, […]
When Tor started in September 2002, it was supposed to be made for civilians to browse the internet privately. But what you do not know is the dark secret behind Tor and how involved the government truly was. You will see that the government at any time, can ask Tor for information about their users.
Sex toy designer Svakom decided that a vibrator needed a camera on the end, and it also needed a Wi-Fi access point – with the utterly predictable result that the device is hackable. Pen Test Partners – these jokes just write themselves, really – took a look at the device, and the researchers probably wish […]
A group of researchers has demonstrated that attackers can steal PINs and Passwords capturing data from smartphone sensors. Modern mobile devices are full of sensors (i.e. GPS, Camera, microphone, accelerometer, magnetometer, proximity, gyroscope, pedometer, and NFC) that could be exploited by hackers to gather data about owner’s activities.
The use of fraudulent ID is a significant societal problem. In this study we examine one potential route to fraud: the use of a manipulated facial image in a photo-ID. The extensive psychological literature on face processing suggests a number of vulnerabilities that could be exploited by people wishing to deceive ID checkers (human or […]
If you’re concerned about your privacy when browsing the internet, a virtual private network is the best way to tell any snoopers to shove off. There’s a problem though. VPNs are notoriously shady, are more complicated than they look, they’re unregulated, and can be more of a security risk than they’re worth if you don’t […]