Time flies like an arrow - Fruit flies like a banana


SSD security challenges

In recent years, a growing number of data breaches have resulted from the improper data removal and insecure storage of drives. It should be noted that almost all drive makers have secure erase or sanitize utilities for their drives. Don’t for get that formatting is not the same as erasing. Apply full disk encryption prior […]

IMEI and privacy

The IMEI number is used by a GSM network to identify valid devices and therefore can be used for stopping a stolen phone from accessing that network. For example, if a mobile phone is stolen, the owner can call his or her network provider and instruct them to “blacklist” the phone using its IMEI number. […]

Firefox Zero-Day unmasks Tor Users

A zero-day exploit in the wild has been used by threat actors to de-anonymize Tor users by executing malicious code on Windows machines. The news is disconcerting and confirms the existence of a zero-day exploit in the wild that’s being used by threat actors to de-anonymize Tor users by executing malicious code on their machine. […]


Bad guys are always looking to abuse overlooked components of a system. On PCs, the Windows Script Host (WSH) was one such often overlooked component, but it’s becoming more popular. WSH can execute scripts written in many programming languages. Out of the box, it does JScript and VBScript but other languages, such as Perl and […]

Signal Adds Disappearing Messages

On Tuesday, Signal added a disappearing message feature that allows users to let messages self-destruct in as little as five seconds or as long as a week. “If you want to have a conversation and not have your history laying around forever, this feature allows you to automate that data hygiene,” says Moxie Marlinspike, the […]

2FA is worth sweetFA

Imagine opening up the YouTube channel you spent the last ten years building, and it’s just gone. Late one night I woke up and checked my phone to discover one of my worst nightmares had come true. My email address had been taken over…as had all of my other social media. My YouTube channel with […]

Spy Gear On Offer – Part 2

Motherboard has obtained a never-before-seen 10-minute video showing a live demo for a spyware solution made by a little known Italian surveillance contractor called RCS Lab. Unlike Hacking Team, RCS Lab has been able to fly under the radar for years, and very little is known about its products, or its customers. The video shows […]

Military Spy Gear On Offer

A confidential, 120 page catalogue of spy equipment, originating from British defense firm Cobham and circulated to U.S. law enforcement, touts gear that can intercept wireless calls and text messages, locate people via their mobile phones, and jam cellular communications in a particular area. The catalogue was obtained by The Intercept as part of a large trove […]


BitLocker Drive Encryption comes with all versions of Windows 10 by default. BitLocker is designed to be used with a Trusted Platform Module (TPM), a tamper-resistent chip that is built into new PCs that can store your disk encryption key. Because BitLocker keys are stored in the TPM, by default it doesn’t require users to enter a […]

Layered Security

While no single strategy can prevent malicious activity, the effectiveness of implementing the Top 4 strategies remains very high. At least 85% of the cyber intrusions that ASD responds to involve adversaries using unsophisticated techniques that would have been mitigated by implementing the Top 4 mitigation strategies as a package. Introduction Australian computer networks are being targeted […]

Easy Secure Encryption Methods?

I am looking for some recommendations on ways to secure either single files (.txt, .jpg, .docx, .xlsx, etc…) or folders on a system. Command line tools are fine, and I’m not picky on Linux vs. Windows. So far I’m thinking of using 7zip’s encryption, for ease of use. What do you guys think? Your WhatsApp secrets […]

Is that a USB in your pocket?

A unique data-stealing trojan has been spotted on USB devices in the wild – and it is different from typical data-stealing malware. Each instance of this trojan relies on the particular USB device on which it is installed and it leaves no evidence on the compromised system. Moreover, it uses a very special mechanism to protect […]

Ransomware defence

The current ‘Locky’ ransomware trojan encrypts not only files on your local computer (including all connected external HDDs), it also encrypts all files on your network it can reach. It even reaches network shares which are not currently activated in your system. On top of this even cloud storage which is synchronized to a local […]

Selfies as a secure access?

Mastercard has created a new way to pay, introducing their Identity Check App which lets you pay with your face. For the selfie generation, it might be the perfect way to pay. MasterCard is trying out a new technology that lets online shoppers authorize a transaction with a snapshot of their face instead of a password. Criminal hackers […]

Best cloud storage encryption tool?

Q: What is the best cloud storage encryption tool that when you change files, the cloud storage program won’t re-upload the whole container/volume and is stable? A: I think what you are looking for is Boxcryptor Uses existing cloud storage providers such as Box, Google Drive,etc. and has an android app. Files are encrypted […]

Vanish © 1999 – All information on this blog is hereby released into the public domain, with no rights reserved. Frontier Theme