Time flies like an arrow - Fruit flies like a banana


SSD security challenges

In recent years, a growing number of data breaches have resulted from the improper data removal and insecure storage of drives. It should be noted that almost all drive makers have secure erase or sanitize utilities for their drives. Don’t for get that formatting is not the same as erasing. Apply full disk encryption prior […]


Bad guys are always looking to abuse overlooked components of a system. On PCs, the Windows Script Host (WSH) was one such often overlooked component, but it’s becoming more popular. WSH can execute scripts written in many programming languages. Out of the box, it does JScript and VBScript but other languages, such as Perl and […]

Spy Gear On Offer – Part 2

Motherboard has obtained a never-before-seen 10-minute video showing a live demo for a spyware solution made by a little known Italian surveillance contractor called RCS Lab. Unlike Hacking Team, RCS Lab has been able to fly under the radar for years, and very little is known about its products, or its customers. The video shows […]

Military Spy Gear On Offer

A confidential, 120 page catalogue of spy equipment, originating from British defense firm Cobham and circulated to U.S. law enforcement, touts gear that can intercept wireless calls and text messages, locate people via their mobile phones, and jam cellular communications in a particular area. The catalogue was obtained by The Intercept as part of a large trove […]


BitLocker Drive Encryption comes with all versions of Windows 10 by default. BitLocker is designed to be used with a Trusted Platform Module (TPM), a tamper-resistent chip that is built into new PCs that can store your disk encryption key. Because BitLocker keys are stored in the TPM, by default it doesn’t require users to enter a […]

Layered Security

While no single strategy can prevent malicious activity, the effectiveness of implementing the Top 4 strategies remains very high. At least 85% of the cyber intrusions that ASD responds to involve adversaries using unsophisticated techniques that would have been mitigated by implementing the Top 4 mitigation strategies as a package. Introduction Australian computer networks are being targeted […]

Easy Secure Encryption Methods?

I am looking for some recommendations on ways to secure either single files (.txt, .jpg, .docx, .xlsx, etc…) or folders on a system. Command line tools are fine, and I’m not picky on Linux vs. Windows. So far I’m thinking of using 7zip’s encryption, for ease of use. What do you guys think? Your WhatsApp secrets […]

Is that a USB in your pocket?

A unique data-stealing trojan has been spotted on USB devices in the wild – and it is different from typical data-stealing malware. Each instance of this trojan relies on the particular USB device on which it is installed and it leaves no evidence on the compromised system. Moreover, it uses a very special mechanism to protect […]

Ransomware defence

The current ‘Locky’ ransomware trojan encrypts not only files on your local computer (including all connected external HDDs), it also encrypts all files on your network it can reach. It even reaches network shares which are not currently activated in your system. On top of this even cloud storage which is synchronized to a local […]

Selfies as a secure access?

Mastercard has created a new way to pay, introducing their Identity Check App which lets you pay with your face. For the selfie generation, it might be the perfect way to pay. MasterCard is trying out a new technology that lets online shoppers authorize a transaction with a snapshot of their face instead of a password. Criminal hackers […]

Vanish © 2016       All information on this blog, unless otherwise noted, is hereby released into the public domain, with no rights reserved. Frontier Theme