Tuesday, March 24th, 2015
There is no such thing as perfect security. Given enough knowledge, resources, and time any system can be compromised. The best you can do is to make it as difficult for an attacker as possible. That said there are steps you can take to harden your network against the vast ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Friday, March 20th, 2015
Security researchers nabbed $552,500 in bounties at this year's Pwn2Own hacking contest, demonstrating exploits against the top four Web browsers, plus Adobe Reader and Flash Player.
On Thursday, the second and final day of the competition, the star of the show was South Korean security researcher JungHoon Lee, aka "lokihardt," who ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, March 3rd, 2015
On Tuesday, March 3, 2015, researchers disclosed a new SSL/TLS vulnerability — the FREAK attack. The vulnerability allows attackers to intercept HTTPS connections between vulnerable clients and servers and force them to use ‘export-grade’ cryptogrpahy, which can then be decrypted. There are several posts that discuss the attack in detail: ...
Posted in Internet, Privacy, Security | No Comments
Sunday, February 22nd, 2015
tl;dr There is a software called Privdog. It totally breaks HTTPS security in a similar way as Superfish.
In case you haven't heard it the past days an Adware called Superfish made headlines. It was preinstalled on Lenovo laptops and it is bad: It totally breaks the security of HTTPS connections. The ...
Posted in Internet, Privacy, Security, Software | No Comments
Friday, February 20th, 2015
Most of us have seen Hollywood movies where hackers trace and spy on mobile devices even though they are switched off. Like most things in spy movies, we disregard it as fiction.
However, recent malware discovered by the AVG mobile security team may change this preconception.
This malware hijacks the shutting down ...
Posted in Hardware, Mobile, Privacy, Security | No Comments