Time flies like an arrow - Fruit flies like a banana


10 Process Injection Techniques

Process injection is a widespread defense evasion technique employed often within malware and fileless adversary tradecraft, and entails running custom code within the address space of another process. Process injection improves stealth, and some techniques also achieve persistence. Although there are numerous process injection techniques, in this blog I present ten techniques seen in the […]

Jamming GPS Signals Is Easy

For the last eight months, security researcher Vlad Gostomelsky has been operating sophisticated detectors around the country to find out who’s using GPS jammers in the wild, and why. His research has turned up fascinating cases of everyday people using the jammers despite the risks — he’s seen truckers trying to avoid paying highway tolls, […]

A Blockchain Explanation

The problem with most blockchain “explainers” is that they provide more detail than what matters to most people, using language that is foreign to most people, which winds up leaving people more confused than when they started. Instead, without worrying about being a technically perfect description, here’s an explanation of blockchain your parents could understand. […]

Password Masking

Perhaps you’ve noticed in the last 5 years or so, progressively more entities have been providing the ability to reveal the contents of a password field. While this ability is, in many cases (especially on devices with lousy keyboards), legitimately useful, it does seem to be a reasonable source of concern. Fast forward to today; […]

Spyware merchants welcome in Oz

An Australian Tax Office (ATO) staffer recently leaked on LinkedIn a step-by-step guide to hacking a smartphone. The documents, which have since been removed, indicate that the ATO has access to Universal Forensic Extraction software made by the Israeli company Cellebrite. This technology is part of a commercial industry that profits from bypassing the security […]

Dashlane Dent My Confidence

Credit: This is a © copyrighted article by Davey Winder that appeared in PC&TECH Authority Magazine – August edition – page 109.   Just as a few of the Real World Computing contributors use iStorage hardware-encrypted devices, so at least two of us have a liking for the Dashlane password management software. Or maybe that […]

iStorage – review

Credit: This is a © copyrighted article by Davey Winder that appeared in PC&TECH Authority Magazine – August edition – pages 108 and 109. Would you like to put the most secure portable hard drive ever made to the test? That was the question asked of me, along with a promise that I’d be the […]

Is that a Microsoft Font?

Back in April, the family of Pakistan’s scandal-plagued prime minister landed in the crosshairs of an investigation relating to the leaked Panama Papers. This week, the team handling the investigation concluded that documents signed by Prime Minister Nawaz Sharif’s family were fraudulent due to the fact that they were purportedly from 2006 but used Microsoft’s […]

Who Has Your Back?

There are three safeguards to ensure that data we send to tech companies don’t end up in a government database: technology, law, and corporate policies. Technology—including the many ways data is deleted, obscured, or encrypted to render it unavailable to the government—is beyond the scope of this report.2 Instead, we’ll focus on law and corporate […]

Vanish © 2016       All information on this blog, unless otherwise noted, is hereby released into the public domain, with no rights reserved. Frontier Theme