Time flies like an arrow - Fruit flies like a banana

Dirt boxes – nasty stingrays

Dirt boxes mimic cellphone towers by tricking every smartphone within a geographic area of up to one-third of a mile to connect with the technology, usually without cellphone users or telecom companies ever knowing about it. Also known as cell-site simulators, the devices can be used from land or air and are capable of intercepting […]

Avira SafeThings

Avira has just launched a new solution called SafeThings, which is a software solution targeted at ISPs and router manufacturers to help protect consumers from poorly secured IoT devices. While these features sound great and will only benefit home users, it still requires ISPs and router manufacturers to get on board first. I’m not convinced […]

WikiLeaks announces “Vault 8”

WikiLeaks published the first-ever batch of source code for CIA cyber-weapons. The source code released today is for a toolkit named Hive, a so-called implant framework, a system that allows CIA operatives to control the malware it deploys on infected computers. WikiLeaks says Hive is just the first of a long string of similar releases, a […]

Keep Your Bitcoin Safe

A few simple steps can help cryptocurrency proponents guard against a swath of common attacks. Just as you might keep your cash out of plain sight, or stash your jewelry in a safe deposit box, it pays to put a little effort into how you manage your cryptocurrency. The following won’t defend against every conceivable […]

Security wasn’t meant to be easy

A Biometric device is a security identification and authentication device. Such devices use automated methods of verifying or recognising the identity of a living person based characteristics that include fingerprints, facial images, Iris prints and voice recognition. We Tried Really Hard To Beat Face ID—and Failed How hard could it be, after all, to reproduce […]

Choose better passwords with the help of science

For years, computer users have been told they should have complicated passwords, including numbers, punctuation marks and other symbols, and upper- and lowercase letters. Despite those being hard to remember, people were told not to write their passwords down, and forced to make up new ones quite frequently. Users dutifully complied – by capitalizing the […]

Pixie 2FA System

Scientists from Florida International University and Bloomberg have created a custom two-factor authentication (2FA) system that relies on users taking a photo of a personal object. The act of taking the photo comes to replace the cumbersome process of using crypto-based hardware security keys (e.g., YubiKey devices) or entering verification codes received via SMS or […]

Android privacy & security guide & Google Fail

Another in the series – “I’m sure you have a friend/relative that would benefit from reading this”. Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps we take each day, and even personal biometric data, such as fingerprints. While all this can make life […]

Vanish © 1999 – All information on this blog is hereby released into the public domain, with no rights reserved. Frontier Theme