Mauricio

2,188 Flips | 1 Magazine | 18 Likes | 1 Following | 28 Followers | @immontilla | Mauricio Montilla Figueroa. Developer. Cyber Security Enthusiast. Madrid. Spain.

What is a 'blockchain phone' and how does it work?

HTC plans to release the Exodus this October, and it will be the world's first blockchain phone. We know the project is spearheaded by Phil Chen, the …

Blockchain

Hack Can Turn Robotic Vacuum Into Creepy Rolling Surveillance Machine

Buying a robotic vacuum cleaner probably sounds like a great idea. Who the hell likes to vacuum? But if it was marketed as an internet-connected …

Robotics

Microsoft Says It Stopped Cyberattacks on Three 2018 Candidates

Microsoft Corp. said it identified and stopped attempts to launch cyberattacks on three 2018 congressional candidates using a phony version of its …

Cyber-attacks

EU Fines Google $5.1B for Abuse of Power

Google's Android deals with smartphone manufacturers demanded they use Google's search bar and Chrome browser by default. According to European …

Chrome Browser

Instagram is building non-SMS 2-factor auth to thwart SIM hackers

Hackers can steal your phone number by reassigning it to a different SIM card, use it to reset your passwords, steal your Instagram and other accounts and sell them for bitcoin. As detailed in a harrowing Motherboard article today, Instagram accounts are especially vulnerable because the app only …

Social Media

Privacy activists to launch tracking-free rival to Facebook

Privacy activists are launching a tracking-free and advertising-free rival to Facebook, aiming to win over disgruntled users from the social media giant following the Cambridge Analytica scandal.<p>In a crowdfunded campaign, the new website, called Openbook, will be set up to change what social media …

Social Media

IT shortages deal tech recruitment specialist Harvey Nash a strong hand

SMALL CAP SHARE IDEAS: IT shortages deal tech recruitment specialist Harvey Nash a strong hand<p>A shortage of software developers in the UK and …

Cybersecurity

Everyone is watching what you do online. How user tracking with cookies works

Have you ever visited a website to check out something you want to buy only to be inundated with ads for that product in other websites?<p>I've been …

IT security

Twitter suspended Guccifer 2.0 and DC Leaks’ accounts

The accounts were named in Friday’s indictments against 12 Russian intelligence agents<p>Twitter has suspended two prominent accounts linked to the 2016 hack on the Democratic National Committee, Guccifer 2.0 and DC Leaks. The move comes after the Justice Department handed down 12 indictments against …

Security

Chrome Is About to Hog Your RAM Even More

Google has pushed out a major security update to the Chrome browser that will greatly reduce the possibility of you suffering Spectre-related …

Google Chrome

Facebook closes loophole that released private group members’ info

Facebook recently closed a serious privacy loophole that gave marketers the ability to discover the members of private groups on the social …

Breast Cancer

Some Senators Want to Know if Smart TVs are Spying on Us

Two US senators have some suspicions about smart TVs, and they’re asking the Federal Trade Commission to look into the data collection practices …

Privacy

How To: Beginner's Guide to OWASP Juice Shop, Your Practice Hacking Grounds for the 10 Most Common Web App Vulnerabilities

Web application vulnerabilities are one of the most crucial points of consideration in any penetration test or security evaluation. While some …

Information Security

How To: Use Command Injection to Pop a Reverse Shell on a Web Server

Command injection is a technique used by hackers to execute system commands on a server, usually via a web application or some kind of GUI. This can …

Cybersecurity

Microsoft Windows Notepad app gets first update in years

There's good news for people who still use Windows Notepad: For the first time in years, big changes are coming to the app — and some of those …

Software

Android security: Password-stealing malware sneaks in Google Play store in bogus apps

At least ten apps were found to be delivering banking trojan malware to victims.<p>A cyber crime group has sneaked apps onto the official Google Play …

Google Play

For just $10, a hacker can attack your business via RDP: Here's how to stay safe

RDP access is being used as an entryway for hackers. Be careful yours doesn't end up for sale on the Dark Web.<p>Remote desktop protocol (RDP) access to …

Cybersecurity

Apple patches 76 security issues with latest software releases

Apple got a small head start on Patch Tuesday pushing out updates for seven products on 9 July, including, iTunes, Safari and iOS.<p>Leading the pack …

Information Security

How To: Use Firefox Rocket to Browse the Web Faster & Save Data on Any Android

Mozilla has created yet another browser for Android. Similar to Firefox Focus, Firefox Rocket was designed to address specific problems: limited …

Software

The Jehovah’s Witness data-collection scandal

The Christian-affiliated group is famous for its habit of showing up at front doors and handing out copies of its religious magazine <i>The Watchtower</i>, …

God

5 Firefox extensions to protect your privacy

In the wake of the Cambridge Analytica story, I took a hard look at how far I had let Facebook penetrate my online presence. As I'm generally …

Privacy

Just Released: iOS 11.4.1 for iPhones Includes More Secure USB Restricted Mode, Bug Fixes & Improvements

After about 40 days of beta testing, Apple pushed out iOS 11.4.1 to everyone as a stable build on Monday, July 9, exactly one week after the final …

Information Security

Snapchat code reveals team-up with Amazon for ‘Camera Search’

Snapchat is building a visual product search feature, codenamed “Eagle,” that delivers users to Amazon’s listings. Buried inside the code of Snapchat’s Android app is an unreleased “Visual Search” feature where you “Press and hold to identify an object, song, barcode, and more! This works by …

Social Media

How to Delay Major Windows 10 Updates

Are you concerned that the latest and greatest updates to Microsoft's Windows 10 might be a little buggy? Certain versions of the operating system …

Windows 10

“Stylish” extension with 2M downloads banned for tracking every site visit

Stylish also stored search results and, by default, a unique identifier.<p>Google, Mozilla, and Opera have pulled a browser extension with more than two …

IT security

Despite Chrome’s pending “mark of shame,” 3 major news sites aren’t HTTPS

Newsweek, Time, and Fox remain vulnerable to injection, man-in-middle attacks.<p>In February, Emily Schechter, the Chrome Security Product Manager at …

Information Security

Nasty browser exploit returns for everyone except Microsoft Edge users

<b>A notorious ‘download bomb’ exploit, where users are bombarded with automatically downloading files when they visit a specific website has returned</b> …

Software

Scientists Discover Hottest, Most Improbable Way to Steal Your Passwords

Scientists have discovered a new way to capture people’s passwords, though the circumstances needed for the attack to work make the odds of it being …

Mission Impossible

Phishing Brings Malware Straight to Your Smartphone

Warnings about phishing attacks are ubiquitous in enterprise cybersecurity awareness programs. Posters line government agency hallways warning users …

Cybersecurity

Apps Aren't Listening to You, But They Are Recording Your Screen

Apps on your phone may not be stealthy snooping on your conversations, but they are doing something equally, if not more, creepy: recording your …

Apps