Time flies like an arrow - Fruit flies like a banana



Seeking to minimize Internet’s susceptibility to spoofed DDoS attacks, we are developing and supporting open-source software tools to assess and report on the deployment of source address validation (SAV) best anti-spoofing practices. This project includes applied research, software development, new data analytics, systems integration, operations and maintenance, and an interactive analysis and reporting service. We […]



And, in the blue corner, we have…. Another fucking digital currency. Just what we need. And, obviously, it’s not going to be the last. We had an article about Monero a few days ago – AlphaBay and Oasis announced that they would integrate Monero. Since then, the demand of Monero has drastically increased. Nevertheless, we […]

If it’s wireless it’s visible


Intercepting Your 4G LTE Calls And Texts Chinese security researchers have found vulnerabilities in 4G LTE networks that allow hackers to intercept calls and text messages as well block mobile signals to targeted phones. 4G LTE mobile networks are widely used around the world, including in Australia. Your Wireless Keyboard Isn’t Safe Many wireless keyboard […]

Private and Government Spying


Spies for hire In July, Simone Margaritelli, an Italian security researcher, boarded a Boeing 777 in Rome headed for Dubai, a city now billing itself as a tech startup hub. He had a big job interview with a new, well-funded cybersecurity company called DarkMatter, whose self-described mission is to “safeguard the most complex organizations,” from […]

USB Armory


The USB armory from Inverse Path is an open source hardware design, implementing a flash drive sized computer. The compact USB powered device provides a platform for developing and running a variety of applications. The security features of the USB armory System on a Chip (SoC), combined with the openness of the board design, empower […]



Bad guys are always looking to abuse overlooked components of a system. On PCs, the Windows Script Host (WSH) was one such often overlooked component, but it’s becoming more popular. WSH can execute scripts written in many programming languages. Out of the box, it does JScript and VBScript but other languages, such as Perl and […]

Land of the Free


In what’s believed to be an unprecedented attempt to bypass the security of Apple iPhones, or any smartphone that uses fingerprints to unlock, California’s top cops asked to enter a residence and force anyone inside to use their biometric information to open their mobile devices. FORBES found a court filing, dated May 9 2016, in […]

Crack for charity


The UK’s Signals Intelligence and Cyber Security agency, GCHQ, has launched its first ever puzzle book, challenging researchers and cryptographers to crack codes for charity. Dubbed “The GCHQ Puzzle Book,” the book features more than 140 pages of codes, puzzles, and challenges created by expert code breakers at the British intelligence agency. Ranging from easy […]

Losing face


How a Facial Recognition Mismatch Can Ruin Your Life It was just after sundown when a man knocked on Steve Talley’s door in south Denver. Flash bang grenades detonated, temporarily blinding and deafening him. Three men dressed in black jackets, goggles, and helmets repeatedly hit him with batons and the butts of their guns. Talley […]

Vanish © 2016 Frontier Theme