Omerta Information Security

By OMERTA INFORMATION SECURITY | Infosec magazine by Remo Hardeman

Adwind and other Evasive Java RATs

RAT – Attackers’ Go-to Swiss Army Knife<p>Modern cyber-attacks against well-defended enterprises are not as simple as you may think. They are comprised …

Cyber encryption is out of sight for camera makers

Industry fights shy over protecting images from seized devices or hacking<p>When a group of more than 150 filmmakers and photojournalists last December …

Cameras

This is what happens when super strong magnets attract at 200 mph

Magnet Expert Ltd filmed two super strong magnets crashing into each other at 200 mph.<p>They recorded the video after YouTube users commented asking to see the result of two strong magnets attracting at high speed.<p>Each magnet has a clamping force of 300 kgs and when the poles are "like" they repel …

Science

German cyber crime rose 80 percent in 2016: report

BERLIN (Reuters) - The German government registered 82,649 cases of computer fraud, espionage and other cyber crimes in 2016, an increase of just over 80 percent from 2015, a German newspaper reported on Sunday.<p>German Interior Minister Thomas de Maiziere is due to release the new statistics, part …

Geeks vs government: The battle over public key cryptography

BBC World Service, 50 Things That Made the Modern Economy<p><b>Two graduate students stood silently beside a lectern, listening as their professor presented their work to a conference.</b><p>Usually, the students would want the glory. And they had, just a couple of days previously. But their families talked …

IIT-Kgp develops technology to unlock encrypted data

Researchers at IIT-Kharagpur (IIT-Kgp) have developed a solution to access encrypted data on cloud servers with keywords, without the need for …

Cookiewall

Volkskrant.nl gebruikt cookies om u een optimale gebruikerservaring te bieden<p>Volkskrant.nl gebruikt cookies en vergelijkbare technologieën (cookies) …

Is Rotterdam Europe's new capital of cool? | CNN Travel

(CNN) — Rotterdam -- the Netherlands' second largest city and Europe's biggest port -- is currently enjoying its transformation from a city plagued with urban problems to a hip place to visit or live.<p>Long lost in the shadow of Amsterdam, crowdfunding initiatives and striking new architecture have …

Europe

Mathematical Backdoors in Symmetric Encryption Systems - Proposal for a Backdoored AES-like Block Cipher

ScitedScite!<p>0<p>PDF<p>Arnaud Bannier,<br>• Eric Filiol<p>Recent years have shown that more than ever governments and intelligence agencies try to control and bypass …

Cookies op Trouw

Trouw.nl gebruikt cookies en vergelijkbare technologieën ("cookies") onder andere om u een optimale gebruikerservaring te bieden.<p>Ook kunnen we …

The UK government's crackdown on encryption threatens to undermine London’s fintech boom

Talk of calamity befalling corporate Britain as we negotiate our EU exit is typically overblown.<p>Nevertheless there is a potentially serious conflict …

Nederland slaapwandelt naar online surveillancestaat « Bits of Freedom

De komende twee weken jast de Tweede Kamer er een wet doorheen waardoor straks onze communicatie massaal door de geheime diensten afgeluisterd kan …

The undercover war on your internet secrets: How online surveillance cracked our trust in the web

Learn how the battle over privacy technologies could define the future of the web. This TechRepublic cover story explains the strange history and the …

Can you remain truly anonymous online? Here’s where to start

Cybersecurity issues are growing on a global scale, if the U.S. election and its aftermath are any indication.<p>Cybersecurity—the behaviors and actions meant to protect users in the online world from theft, fraud and other crime aimed at stealing information and data—is a serious personal issue, too. …

Hypergolix

Powerful<p>Hypergolix has automatic LAN failover, NAT traversal, and more. Monitor your home server from airplane WiFi with 30 minutes of …

Differential Privacy vs. End-to-end Encryption – It’s Privacy vs. Privacy!

<i>This blog is an excerpt of an article that currently appears on infosecisland.com.</i> <i>Written in collaboration with Yunhui Long.</i>In this time and age, …

Privacy

Calibrating Noise to Sensitivity in Private Data Analysis

Theory of Cryptography Conference<p>TCC 2006: Theory of Cryptography pp 265-284<p>Cynthia Dwork<br>• Frank McSherry<br>• Kobbi Nissim<br>• Adam Smith<p>Conference paper<p>DOI: …

The $5 PoisonTap quickly, completely hijacks even a locked computer’s internet

After I learned of this clever exploit from Samy Kamkar, my poor 2012 MacBook Air looks more vulnerable than venerable: Asleep on the table, its USB ports exposed, it could be hijacked in seconds by a malicious Raspberry Pi Zero called PoisonTap. No need for passwords, zero-days or million-dollar …

Information Security

Antivirus Fails to Stop Ransomware 100% of the Time

<b>Traditional antivirus fails to stop ransomware 100% of the time.</b><p>That’s according to a recent survey from Barkly of companies that suffered successful …

The Competitive Landscape for Machine Intelligence

Three years ago, our venture capital firm began studying startups in artificial intelligence. AI felt misunderstood, burdened by expectations from science fiction, and so for the last two years we’ve tried to capture the most-important startups in the space in a one-page landscape. (We prefer the …

Facebook Continues Its Push to Change the Data Center Industry

As Facebook prepares for more people streaming live videos and playing with virtual reality on its networks, it’s building new data center hardware …

Open Source Movement

Android's latest update doesn't patch major security flaw

The November Android security update is live and it fixes 15 critical vulnerabilities, but it doesn't patch a major Linux kernel exploit that can give hackers quick and complete access to devices running on Google's OS. Researcher Phil Oester discovered the flaw (CVE-2016-5195) in October, though …

Orange Is the New Raspberry? Welcome to the Age of the $20 Quad-Core Computer

The good thing about technology is that it doesn’t just improve with each iteration, it often becomes less expensive as well. 3D printers, medical …

Prinses Irene: diep gekwetst door biografie over Juliana

Prinses Irene is "diep gekwetst" door de inhoud van de nieuwe biografie van haar moeder, Juliana. "Ik vind het een ontluisterend boek. Het doet me …

Simple way for detect the remotely user's antivirus software type with use HTML page.

Privacy is creating a new digital divide between the rich and poor

How come Facebook knows that I have a mother with Alzheimer’s, a woman asked the other day. She was sure that she hadn’t provided the social medium …

Privacy

Twitter Account Shows Mirai Botnets Using Your Security Camera In Cyber Turf War

Huge armies of infected devices are attacking everyone. Even each other.<p>In the wake of a major cyber attack that blocked access to popular websites along the East Coast on Friday, security researchers have created a Twitter account that posts live updates of ongoing distributed denial-of-service …

Research team develops portable iPhone-powered lab that can detect cancer with 99% accuracy

It’s no secret that Apple has ambitious plans for iPhone and Apple Watch in the health industry, but it’s not the only company looking for ways to integrate smartphones in the medical field. Recently, a research team from Washington State University, under the leadership of assistant professor Lei …

Massive cyberattack turned ordinary devices into weapons

A cyberattack that took down large swaths of the internet around the world on Friday was carried out, in part, by unsuspecting devices connected to the internet.<p>Security firm Flashpoint said it believes that digital video recorders and webcams in people's homes were taken over by malware and then, …

Cybersecurity