Omerta Information Security

By OMERTA INFORMATION SECURITY | Infosec magazine by Remo Hardeman

Smoke Loader - Beware of Fake Spectre and Meltdown patches

Crooks trying to take advantage of the infamous bug Meltdown and Spectre which affects almost all the modern processors and pushes Smoke Loader …

Information Security

How to Create an Anonymous Email Account

It's not easy to be anonymous on the internet. Here's how you can stay hidden even on email.<p>This story originally appeared on PCMag<p>Not long ago, the sharing economy seemed to take over. Privacy was dead, and no one cared. But that was a pre-Snowden era. Now, for some, the need to go truly anonymous …

How to Create an Anonymous Email Account

The Internet doesn't make it easy to go completely anonymous. Here's how you can stay hidden even when emailing.<p>PCMag reviews products independently, …

Remotely Exploitable Flaw Found In HP Enterprise Printers—Patch Now

Security researchers have discovered a potentially dangerous vulnerability in the firmware of various Hewlett Packard (HP) enterprise printer models …

Scientists figured out how to make cancer cells “commit suicide” — here’s how it works

Scientists have found a way to make cancer cells kill themselves in multiple ways, simultaneously.<p>“It’s like committing suicide by stabbing yourself, …

How to 'deep clean' your online activity

<b>Jared O'Mara is not the first person to have old comments he posted online come back to haunt him.</b><p>The Labour MP resigned from the Women and Equalities Committee after misogynistic remarks and degrading jokes he posted more than 10 years ago resurfaced.<p>The scandal raises the question: what steps can …

Recap Cyber Security Week 2017

<b>From 25-29 September, The Hague Security Delta organised the second edition of international Cyber Security Week together with 100 partners from</b> …

Apple: don't use Face ID on an iPhone X if you're under 13 or have a twin

Facial recognition system is 20 times more secure than Touch ID, but struggles with young users and siblings<p>The iPhone X might be the future of Apple’s smartphone design, but its lauded Face ID facial recognition system has an issue with people under 13: it’s much more difficult to tell them …

Craig Federighi

Top Security Firm May Be Leaking 'Terabytes' of Confidential Data From Fortune 100 Companies [Updated]

A leading American security company and purveyor of anti-malware detection services is waking up to a damning report about a massive vulnerability in …

Security

New Petya Ransomware Attack PREVENTED by Minerva Labs

A new ransomware is causing mayhem in what appears to be one of the most catastrophic and aggressive ransomware attacks ever seen.

Ransomware

Adwind Malware and other Evasive Java RATs

Java

Encryption is out of sight for camera makers

When a group of more than 150 filmmakers and photojournalists last December called on Canon, Nikon and other well-known camera manufacturers to add …

Cameras

This is what happens when super strong magnets attract at 200 mph

Magnet Expert Ltd filmed two super strong magnets crashing into each other at 200 mph.<p>They recorded the video after YouTube users commented asking to see the result of two strong magnets attracting at high speed.<p>Each magnet has a clamping force of 300 kgs and when the poles are "like" they repel …

Crashing

German cyber crime rose 80 percent in 2016: report

BERLIN (Reuters) - The German government registered 82,649 cases of computer fraud, espionage and other cyber crimes in 2016, an increase of just over 80 percent from 2015, a German newspaper reported on Sunday.<p>German Interior Minister Thomas de Maiziere is due to release the new statistics, part …

Cybercrime

Geeks v government: The battle over public key cryptography

<b>Two graduate students stood silently beside a lectern, listening as their professor presented their work to a conference.</b><p>Usually, the students would want the glory. And they had, just a couple of days previously. But their families talked them out of it.<p>A few weeks earlier, the Stanford researchers …

IIT-Kgp develops technology to unlock encrypted data

Researchers at IIT-Kharagpur (IIT-Kgp) have developed a solution to access encrypted data on cloud servers with keywords, without the need for …

Cookiewall

Volkskrant.nl gebruikt cookies om u een optimale gebruikerservaring te bieden<p>Volkskrant.nl gebruikt cookies en vergelijkbare technologieën (cookies) …

13 reasons to visit Rotterdam right now | CNN Travel

Rotterdam

Mathematical Backdoors in Symmetric Encryption Systems - Proposal for a Backdoored AES-like Block Cipher

ScitedScite!<p>0<p>PDF<p>Arnaud Bannier,<br>• Eric Filiol<p>Recent years have shown that more than ever governments and intelligence agencies try to control and bypass …

Cookies op Trouw

Trouw.nl gebruikt cookies en vergelijkbare technologieën ("cookies") onder andere om u een optimale gebruikerservaring te bieden.<p>Ook kunnen we …

The UK government's crackdown on encryption threatens to undermine London’s fintech boom

Talk of calamity befalling corporate Britain as we negotiate our EU exit is typically overblown.<p>Nevertheless there is a potentially serious conflict …

Downing Street

Nederland slaapwandelt naar online surveillancestaat – Bits of Freedom

<b>We vonden het toch niet oké toen bleek dat andere landen dit deden?</b><br>Dat klopt. Vlak na de eerste Snowden-onthullingen in juni 2013 zei PlasterkWe …

The undercover war on your internet secrets: How online surveillance cracked our trust in the web

Learn how the battle over privacy technologies could define the future of the web. This TechRepublic cover story explains the strange history and the …

Can you remain truly anonymous online? Here’s where to start

Cybersecurity issues are growing on a global scale, if the U.S. election and its aftermath are any indication.<p>Cybersecurity—the behaviors and actions …

Hypergolix

Powerful<p>Hypergolix has automatic LAN failover, NAT traversal, and more. Monitor your home server from airplane WiFi with 30 minutes of …

Differential Privacy vs. End-to-end Encryption – It’s Privacy vs. Privacy!

<i>This blog is an excerpt of an article that currently appears on infosecisland.com.</i> <i>Written in collaboration with Yunhui Long.</i>In this time and age, …

Privacy

Calibrating Noise to Sensitivity in Private Data Analysis

1.<p>Adam, N.R., Wortmann, J.C.: Security-control methods for statistical databases: a comparative study. ACM Computing Surveys 25(4) (December …

The $5 PoisonTap quickly, completely hijacks even a locked computer’s internet

After I learned of this clever exploit from Samy Kamkar, my poor 2012 MacBook Air looks more vulnerable than venerable: Asleep on the table, its USB ports exposed, it could be hijacked in seconds by a malicious Raspberry Pi Zero called PoisonTap. No need for passwords, zero-days or million-dollar …

Information Security