Israeli digital intelligence firm Cellebrite sells software designed to unlock phones and extract their data. As a result, its products are a favorite of law enforcement agencies across the U.S., and police frequently use them to gather evidence from seized devices. In the past, the company has received criticism for its willingness to sell to pretty much any government—including repressive regimes around the world. However, despite its mission to compromise phone security everywhere, Cellebrite would appear to have little interest in securing its own software—if you believe the CEO of encrypted chat app Signal.
Shit is real in the online battlefield….
Some people believe taking a computer offline makes it impossible to hack. These offline PC attacks show it’s not as safe as you imagine.
Data breaches are rapidly becoming a part of everyday online life. Even a cursory glance at the news highlights the latest leak of confidential or personal information onto the internet. While many people are increasingly concerned by these developments, it can often seem as though you are powerless against them.
Many, if not most, organisations will tell you that they have processes and procedures that they follow when employees leave.
In particular, most companies have a slick and quick procedure for removing ex-staff from the payroll.
Firstly, it doesn’t make economic sense to pay someone who is no longer entitled to the money; secondly, many countries require employers to withhold payroll taxes automatically, to pay those taxes in promptly, and to account for them accurately.
Why get into trouble with the tax office over former employees when you can have a simple “staff leaving” checklist that will help to keep you compliant and solvent at the same time?
Unfortunately, we’re not always quite so switched on (or, to be more precise, not quite so good at switching things off) when it comes to ex-staff and cybersecurity.Continue reading
This recently released research paper: Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions by Matthew Green and his team which is also covered by WIRED talks about design flaw in data encryption of android and iOS. Wired brushes off most of the technical details and the paper didn’t cover android’s File Based Encryption very well which I think needs some clarity on it. The paper draws the correct conclusion though and what should be improved in successor android versions.
Shelter is a handy app that lets you create a sandbox on your Android device. This means you can run cloned copies of apps, store documents, and maintain accounts separately from your main workspace. It’s like having an extra phone living inside your device! Continue reading
QR codes make it easy to reach web-based resources without struggling with the tiny keyboard of your smartphone. But do you really know what you’re going to get when you scan one?Continue reading
This is a wild ass story about how the Net used to be VERY vulnerable….
On the evening of November 2, 1988, in a quiet computer lab at MIT, a student majorly screwed up.
Robert Tappan Morris, a 23-year-old computer science student at Cornell University, had written 99 lines of code and launched the program onto the ARPANET, the early foundation of the Internet. Unbeknownst to him, he had just unleashed one of the Internet’s first self-replicating, self-propagating worm – “the Morris Worm” – and it would change the way we saw the Internet forever.Continue reading
Some good tips on here for protecting yourself outside YouTube as well…
YouTube Content Creators keep getting hacked, so here are 9 tips from an cybersec educator about how to protect your google and youtube account from getting hacked.Continue reading
The former chief of Uber’s security was charged this week in connection with an alleged cover-up of a massive 2016 hack that exposed the personal information of some 57 million Uber users—a breach he tried his hardest to sweep under the rug.
They been doin this shit for about a decade now…
A guide to stingray surveillance technology, which may have been deployed at recent protests. Continue reading