JJ Safer

196 Flips | 4 Magazines | 44 Likes | 22 Following | 6 Followers | @jjsafer | Keep up with JJ Safer on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “JJ Safer”

Tools used for solving and cracking CTF challenges

<i>Tools used for solving CTF challenges</i><p>Attacks<p><i>Tools used for performing various kinds of attacks</i><p>Bettercap - Framework to perform MITM (Man in the …

Stop Using 6-Digit iPhone Passcodes

Now that police agents can allegedly crack iPhones protected with passcodes made of six numbers, it’s time to use longer, harder to guess and crack alphanumeric passphrases.<p>How long is your iPhone PIN? If you still use one that’s only made by six numbers (or worse, four!), you may want to change …

Information Systems

Alphabet's Outline lets you run your own self-hosted VPN for free

Jigsaw, an incubator that’s part of Google’s parent company, Alphabet, has launched Outline, an open-source virtual private network (VPN) that you can host on your own server at no charge.<p>As an initiative from the human-rights-focused Jigsaw, Outline is being billed as a tool to help journalists …

How To: The White Hat's Guide to Choosing a Virtual Private Server

Conducting phishing campaigns and hosting Metasploit sessions from a trusted VPS is important to any professional security researcher, pentester, or …

New DNS Service Launched by IBM Vows to Keep Your Browsing Habits Secret

A new online service was launched Thursday morning to keep your browsing habits out of the hands of marketers and help you automatically avoid …

The Motherboard Guide to Not Getting Hacked

Do you want to stop criminals from getting into your Gmail or Facebook account? Are you worried about the cops spying on you? We have all the answers on how to protect yourself.<p><i>Editors note: This is Motherboard's comprehensive guide to digital security, which will be regularly updated and replaces</i> …

Information Systems

Send scam emails to this chatbot and it’ll waste their time for you

Chatbots. They’re usually a waste of your time, so why not have them waste someone else’s instead? Better yet: why not have them waste an <i>email scammer’s</i> time.<p>That’s the premise behind Re:scam, an email chatbot operated by New Zealand cybersecurity firm Netsafe. Next time you get a dodgy email in …

Artificial Intelligence

How to win an argument, even when you're wrong

I taught him a technique that I have found incredibly powerful. So powerful, you can even use it to great effect, with evil intent.<p>I'm not suggesting that you'd do this, but I do love a good debate. It's possible there may have been times, at a dinner party or two, where I've used this approach to …

Tesla's new Solar Roof is actually cheaper than a normal roof

Good news for those who have been eyeing Tesla’s new Solar Roof – the company just announced pricing for its photovoltaic tiles, and they come in at …

Clean Energy

How to make a $7 cellphone sniffer

Please don’t use it for anything creepy<p>Tracking cellphone signals is much, much easier than you think. This demo from Danish IT pro Keld Normal uses a $7 USB device to snoop in on cell signals, essentially sniffing out any cellphones connected to a tower nearby.<p>There’s a lot of Ubuntu and Python …

NanoPi Neo Plus2 $25 Mini PC Is Even Smaller Than Raspberry Pi

A new mini PC has been unveiled this week called the NanoPi Neo Plus2, which is half the size of the Raspberry Pi measuring just 40mm x 52mm and yet …

Top 15 Python Libraries For Data Science In 2017 | Articles | Chief Data Officer

As Python has gained a lot of traction in the recent years in the Data Science industry, I wanted to outline some of its most useful libraries for …

You need to encrypt all your data. This is how it’s done

The increasing amount of data we’re all generating is everywhere: in smartphones, laptops, thumb drives, and dozens of online services. How can we secure all of them against unwarranted access?<p>We virtually can’t.<p>Smartphones get stolen, thumb drives get lost, email passwords get brute-forced, cloud …

Growing Cyberthreat: Steganographic Malware Hiding In Images

As defenses against standard cyberattacks evolve, so do the methods of attack carried out by malicious actors. Security researchers say a type of …

ProtonMail moves beyond encrypted emails and into VPNs with the global launch of ProtonVPN

ProtonMail has officially launched its first new standalone service, three years after the company’s original encrypted email service went to market.<p>With ProtonVPN, the Swiss company is doubling down on its privacy-focused smarts with a new virtual private network (VPN) service. A beta version of …

Raspberry Pi TOR Access Point

Raspberry Pi enthusiasts interested in making their very own TOR Access Point powered by the excellent mini PC may be interested in the new tutorial …

Companies Are Figuring Out How to Turn the Tables on Hackers

Picture a bank robber (complete with tiny black mask and oversized sack, of course). He operates at night, slipping past the security cameras and …

New NIST guidelines banish periodic password changes

New draft guidelines have been issued by NIST are recommending that users should not be forced to periodically change their passwords.Guest …

IT security

Massive database containing over 560 million passwords discovered

Looks like it’s time to change passwords again. Security researchers have discovered a massive database of login credentials — over 560 million emails and passwords — put together by an unknown person. All of the information is insecure.<p>The database was discovered by the Kromtech Security Research …

LastFM

New essential pentest tool - WHID Injector: How to Bring HID Attacks to the Next Level

New pentest tools‍ released! The WHID injector‍ is like the rubberducky‍ and hak5 turtle‍ but has wifi capabilities so that you can remote control …

Forensics

How to Secure Your Online Accounts By Revoking Access From Third-Party Apps

Every once in a while, an app like Unroll.me pops into the spotlight to remind us that we all tend to authorize a lot of apps to access our email and …

IDVector Pocket Online Privacy System (video)

Anyone searching for a portable and pocket sized online privacy system to keep them safe, may be interested in a new piece of hardware called the …

Steve Ballmer builds an open database of government spending

Our leaders may be determined to make their daily dealings less transparent, but they probably didn't reckon on bored Steve Ballmer. The former Microsoft CEO has spent more than $10 million on a new project to open up the US government budget. USA Facts, as profiled in the <i>New York Times</i>, is an …

How to find a trustworthy VPN service

Determining whether a VPN service is trustworthy can be complicated. Fortunately, there are a few easy steps you can follow to know if a VPN service …

Privacy

How to Set Up Your Own Completely Free VPN In the Cloud

A Virtual Private Network (VPN) is a great way to add security to your browsing while also preventing snoopers (including your internet service …

Information Systems

Two open source secure email services

As much we all complain about email, for most of us, email is still our primary conduit for online communication. That said, numerous hacks and …

Top 10 operating systems for ethical hackers and penetration testers

<i>A hacker is a highly skilled computer operator who uses bugs and exploits to break into computer systems and networks. An ethical hacker, on the</i> …

Executives and Board Members Could Face Liability for Data Breaches

Article By<p>Albert Bianchi, Jr.<p>Michelle L. Dama<p>Adrienne S. Ehrhardt<p>Michael Best & Friedrich LLP<p>Client Alert<p>Communications, Media & Internet<p>All …

Intellectual Property

FreedomPop launches a cheap phone to go with its free SIM

Well, this is unexpected. FreedomPop has unveiled its own Android phone today, for the darn-cheap-but-not-quite-free price of £59. The new FreedomPop V7 runs on a Qualcomm Snapdragon 210 processor, 1GB of RAM and a 2,100mAh battery. Not the best components, but respectable ones given the asking …

New Fileless Attack Using DNS Queries to Carry Out PowerShell Commands

A unique attack called DNSMessenger uses DNS queries to carry out malicious PowerShell commands on compromised computers.

Cybersecurity