The idea that the Android platform is insecure is popular and persistent. And quite possibly wrong. Keep your Android device safe You can help keep your Android device secure by using a screen lock, 2-step verification, and other Android security features. In case your phone gets lost, you can be prepared with Android Device Manager. Again, […]
The hacker’s name is Janit0r. You’ve probably never heard of him, but perhaps you’ve heard of his work. Janit0r is reportedly the one behind a particularly gnarly but undeniably fascinating form of malware called BrickerBot. BrickerBot, as the name implies, will brick internet of things (IoT) devices that fail a simple security test. This is […]
It’s time to get serious about security, to break through the bullshit, and to implement Two Factor Authentication right now! There are, simply put, three generally accepted methods of authenticating identity: knowledge; possession; and inherence. The first is familiar to everyone in the form of the password, passphrase, PIN, or even the pattern drawn with […]
Occasionally fuckups happen, even with Qubes (although not as often as some think). What should we – users or admins – do in such a situation? Patch, obviously. But is that really enough? What good is patching your system if it might have already been compromised a week earlier, before the patch was released, when […]
To get any of your information, it’s as easy as typing your email on Google and waiting for the results. Hackers and big companies alike can track you in many different ways – from stocking your photos to studying your check-in, to display customised advertisements on your social media pages. In short, these companies and […]
While the rampage of ransomware was the attention-grabbing story of last year, the subtitle for 2016 was comprised of just three words: Internet of Things. Four words if you precede “things” with the almost obligatory “Insecure”. That connected devices are of interest to hackers — and connectivity is all we’re really talking about when we […]
The Federal Government’s Metadata Retention Scheme has now become compulsory for telcos and internet service providers in Australia. This means your metadata – including text messages, location information and internet connection details – will be stored for two years and available to Government agencies to access on request without a warrant. There are over five […]
The latest online malware, dubbed Brickerbot, is particularly nasty, as it virtually destroys vulnerable devices. This new approach has led to a new term, PDoS, for Permanent Denial of Service. Hacked devices don’t go up in smoke, but the software on the devices is almost entirely wiped out. For most people, most of the time, […]
When Tor started in September 2002, it was supposed to be made for civilians to browse the internet privately. But what you do not know is the dark secret behind Tor and how involved the government truly was. You will see that the government at any time, can ask Tor for information about their users.
Sex toy designer Svakom decided that a vibrator needed a camera on the end, and it also needed a Wi-Fi access point – with the utterly predictable result that the device is hackable. Pen Test Partners – these jokes just write themselves, really – took a look at the device, and the researchers probably wish […]
A group of researchers has demonstrated that attackers can steal PINs and Passwords capturing data from smartphone sensors. Modern mobile devices are full of sensors (i.e. GPS, Camera, microphone, accelerometer, magnetometer, proximity, gyroscope, pedometer, and NFC) that could be exploited by hackers to gather data about owner’s activities.