The ACLU put together an interesting web page (see here). By surfing the web, they have put together a map with information – as best they have at the moment – of what states are using Stingrays to track citizens and what states are not. I say citizens and not crooks because a Stingray will collect […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A couple of months ago I wrote about an iPhone bug that allows users to unintentionally install rogue iPhone Apps (see post). Well now Android users are getting hit with a similar attack. Ars technica is reporting that they have found an Android Installer hijacker (see article). Like the iPhone bug, it only works if […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
SSL and TLS, the security protocols that protect most of our banking and ecommerce transactions is a complicated beast – more so due to the the many options it offers. ars technica in an article titled “Noose around Internet’s TLS system tightens with two new decryption attacks”, discussed a paper presented at Black Hat Asia that describes […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Max Schrems, whom I have written about before (see post) is continuing his fight against Facebook. He first took his battle to the Irish Data Protection Commissioner (DPC) since Facebook Europe is based in Ireland, but the DPC declined to take the case, because, it said, it had no legal requirement to do so (meaning […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Remember when you bought that phone or USB cable at Radio shack and they asked for your name and email address? CBS is reporting that Radio Shack listed that as an asset in their bankruptcy and has put it up for sale. That means your name, address, phone number and purchase information is up for […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Researchers at David Ben Gurion University in Israel have demonstrated controlling a toy rocket launcher attached to an air gapped computer by another computer nearby (see article). There are lots of limitations to this attack, but still it shows how a motivated attacker like the NSA or its competitors, can suck data out of a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]