Eskil

12 Flips | 1 Magazine | 2 Likes | @Eskil2015 | Keep up with Eskil on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Eskil”

What The FREAK? Why Android And iPhone Users Need To Pay Attention To The Latest Hot Vulnerability

There’s another widespread vulnerability in town and it affects a lot of web denizens, especially Google Android and Apple iPhone Safari users. It’s called FREAK, but don’t let it completely freak you out. Though a lot of websites and devices are vulnerable, carrying out FREAK attacks isn’t trivial …

Information Security

FREAK Attacks Can Hurt Android and Apple Users, Blockchain Networks May Be a Remedy

A group of researchers in miTLS team have found a new vulnerability in the SSL/TLS protocol. This vulnerability is called FREAK, and it concerns …

The #1 Thing Employees Do That Compromises Their Own Company's Cyber Security

<i>Cyber security is a top concern in the IT industry today. In this series, we will look at various threats to cyber security – and what steps businesses can take to meet those threats head on.</i><p>As a white hat hacker whose job it is to look for loopholes in cyber security, I love to check out cars and …

Hillary’s Secret Email Was a Cyberspy’s Dream Weapon

When a notorious online break-in artist got a hold of the Secretary of State’s now-infamous email address, he gave himself the power to use it to …

How To Protect Your Home Wi-Fi Network From Hackers!

Wireless routers are wonderful things! They let us use our laptop all around the house, without having to worry about messy cables everywhere. They …

The rise of biometric security could 'kill the password dead'

Biometrics, which can include fingerprints, iris scans, facial or voice recognition and other methods, got a major boost with Apple's introduction of its iPhones with Touch ID.<p>Samsung followed with its own fingerprint scanner and Qualcomm recently unveiled its 3D fingerprint technology incorporated …

The Business Of Privacy On Show At MWC

Call it the Edward Snowden effect. Privacy was a theme bubbling under the surface at the Mobile World Congress tradeshow — even more so than last year when Silent Circle and Geeksphone grabbed attention with demos of a privacy-centric smartphone called Blackphone.<p>This year they were back with a …

Edward Snowden,Computing,NSA,The NSA files,GCHQ,Privacy,Mobile phones,Mobile phones,Technology sector,Telecommunications industry,Internet,Technology<p>Edward Snowden’s astute revelations show that no electronic communications device – from hard disks to sim cards – is trustworthy<p>Back in July 2013, a …

Surveillance

Internet Storm Center Diary 2018-05-27, Author: Didier Stevens

Reader Ruben submitted a malicious executable (MD5 905a5167b248647ce31d57d241aacd63):<p>This PE file (analyzed here with pecheck.py) contains a section …

Cybersecurity

The Internet killed privacy: Our liberation, and our capture, are within the same tool

Our historic respect for privacy has become victim to the national security state — and the Web makes it easy<p>It’s true that snooping has been with us from the earliest gossip grapevines linking our grass huts. And we’ve endured modern forms of surveillance such as wiretaps and bugs. But those …

Hacking Putin's Eyes: How To Bypass Biometrics The Cheap And Dirty Way With Google Images

Alongside the abundance of phones and apps on show at the mad Mobile World Congress this week were some devices that offered a special way to secure devices. Namely, eye scan logins. Both ZTE and Fujitsu let attendees loose on their versions of the authentication technology, though the commercial …