A few months ago, I wrote a post on SMS logins following a wave of attacks attempting to take over Iranian Telegram accounts. Recently, there have been new confirmed cases of attacks in both Iran and Russia. Oleg Kozlovsky is an opposition activist and the director of Vision of Tomorrow Center in Moscow. In a
Many of you may have already read this article at wired.com. For those that haven’t it’s a must read. Signaling System 7 (SS7) is just now getting more public attention because of a 60 Minutes piece last week, which showed two German researchers using SS7 to spy on US Congressman Ted Lieu, with his permission. So
In Brief The US Supreme Court has approved amendments to Rule 41, which now gives judges the authority to issue search warrants, not only for computers located in their jurisdiction but also outside their jurisdiction. Under the original Rule 41, let’s say, a New York judge can only authorize the FBI to hack into a suspect’s
Tor Matt Edman is the cyber security expert and former employee of the Tor Project that helped the FBI to hack and de-anonymize Tor users in several court cases, including the clamorous Operation Torpedo and Silk Road. According to an investigation by the Daily Dot, Edman helped the Feds in developing of a custom malware, also known Cornhusker or Torsploit
Unless you are from Russia, you probably haven’t heard of a service, that analyzes an image of a person and finds their account in VK.com social network. It’s called FindFace. It was introduced in February 2016, but has recently become quite popular; thanks to the impressive photo project, published by the St.Petersburg photographer Egor Tsvetkov.
End-to-end encryption by default is quickly becoming the new standard for any communications app that claims to care about the privacy of those who use it. But not all encryption is created equal. And default doesn’t always mean default.
Who are we? Garage4hackers is one of the oldest open information security community for Information Security enthusiast and aspirants on the internet. We started off as an Orkut Community “Hackers Garage” back in 2007 and today we have more than 6K members sharing knowledge across various fields of infosec. “Our mission is to spread Infosec
I am looking for some recommendations on ways to secure either single files (.txt, .jpg, .docx, .xlsx, etc…) or folders on a system. Command line tools are fine, and I’m not picky on Linux vs. Windows. So far I’m thinking of using 7zip’s encryption, for ease of use. What do you guys think? Your WhatsApp secrets
Software reverse engineering is frequently mentioned in the context of illegal activity. At the same time, reversing has legal applications, the most known of which is malware research. It can be also used to provide improved compatibility with the closed platforms, enhanced applications, and advanced OS features. In particular, in the United States, there is a
If you happen to follow the security scene, you must have noticed a lot of buzz around various security issues discovered this month. Namely, a critical vulnerability in the Microsoft Graphics Component, as outlined in the MS16-039 bulletin, stories and rumors around something called Badlock bug, and risks associated using Firefox add-ons. All well and
Yesterday, Opera announced they’ve added a free VPN client with unlimited data usage in the latest developer version of their browser. Michal Špaček, a web developer and security engineer based in Prague, researched the way Opera’s VPN works and discovered there’s more marketing than security behind Opera’s claims. What Opera offers is not a VPN
Opera has built a free virtual private network (VPN) service into the latest version of its browser for Windows and OS X. It seems Opera acquired SurfEasy in March of last year with just this in mind – baking the SurfEasy VPN into its software as an additional security and privacy measure for users. The
Anonymous, the most popular collective of hacktivists, has announced a new chat room in the DarkWeb dedicated to teaching its sympathizers hacking and coding techniques and encryption mechanisms. Anonymous also published a video on YouTube announcing the chat room and the service it offers. This is not a website, it’s an IRC chat server. You must
Following on from yesterdays post – and the highlights were: They were able to do it by exploiting a security flaw they discovered in Signaling System Seven — or SS7. It is a little-known, but vital global network that connects phone carriers. The SS7 network is the heart of the worldwide mobile phone system. Phone
A lot of modern life is interconnected through the Internet of things — a global empire of billions of devices and machines. Automobile navigation systems. Smart TVs. Thermostats. Telephone networks. Home security systems. Online banking. Almost everything you can imagine is linked to the world wide web. And the emperor of it all is the