Vanish

Time flies like an arrow - Fruit flies like a banana

Miscellaneous

Tor

Operating Systems for Browsing the Dark Web: Windows, Mac, or Linux? If you are reading this, then you have obviously decided to take a trip down the rabbit hole into the dark web. Like any other trip you take, the vehicle you use is a key factor. In this case, the vehicle in question is […]






Triple your privacy

Triple your privacy with a Chromebook and two VPNs As a Defensive Computing guy, I have been focused on privacy invasions by an ISP for a while now. I’m well past generic reactions. Here I propose a Chromebook and two VPNs to dial your security and anonymity up to 11. Part of the privacy boost […]






Domain Fronting

Security firm FireEye continues to follow APT29 group and on Monday it revealed that the cyber spies have been using a technique called “domain fronting” to make hard the attribution of their attacks. In December, the Signal development team introduced the ‘domain fronting’ technique to circumvent censorship. The astonishing news is that the APT29 group […]






Evaluating The Risk Of DoubleAgent

Security startup Cybellum recently announced a new attack that they’re calling “DoubleAgent”. They’ve labelled this a zero day “attack for taking full control over major antiviruses and next-generation antiviruses”. There’s a lot to unpack here. When you’re assessing the risk any issue poses it’s always best to clearly define the issue. Let’s start there.  






Dark Web

Operating Systems for Browsing the Dark Web If you are reading this, then you have obviously decided to take a trip down the rabbit hole into the dark web. Like any other trip you take, the vehicle you use is a key factor. Number of Dark Web Hidden Services Has Dramatically Dropped The dark web […]






End of Privacy Is Here

Privacy is for paedos. Google knows what you’re looking for. Facebook knows what you like. The CIA knows how to use your TV/Smartphone to spy on you. Your communications are being monitored 24X7. Still think you have privacy? If you still think you have privacy, 21-year-old Russian photographer Egor Tsvetkov will convince you to think […]






The benefits of shadow IT

Shadow IT is the use by employees of unauthorised cloud applications and services, such as Dropbox, Google Docs and OneDrive. This definition does not imply these apps and services are inherently dangerous or insecure, simply that they have not been authorised for use by the IT department and so are often invisible to security controls. This […]






Vanish © 2016       All information on this blog, unless otherwise noted, is hereby released into the public domain, with no rights reserved. Frontier Theme