“In June of this year, “Ripple20” (not only) shook the Internet of things: 19 vulnerabilities in a TCP/IP Stack for Embedded devices made “hundreds of millions” devices vulnerable, according to their discoverers. Now, Stack analysis by another team of researchers […]
all internet connected devices need regular maintenance and security updates (especially those directly accessible to the internet (without proxy (hopefully that proxy gets regular security updates)) it is a good idea to 1) backup then 2) update, in case user […]
contains advertisement. to be honest, it is hard to keep up the speed at which cyber incidents are reported. here is the latest take on “Russian IT Sec Updates”. have phun! SecurityLab, [28.09.20 08:20] Last month, TikTok developers rolled […]
SecurityLab, [14.07.20 15:35] The Electronic Frontier Foundation (EFF) has unveiled a new database demonstrating how and where us law enforcement agencies use tracking technologies. A map of the use of tracking technologies in the United States is presented (https://www.securitylab.ru/news/510018.php) SecurityLab, […]
All SmartPhones are spies! that’s why Merkel keeps the Nokia from 1995 (even if that device is spied on as well, because it can not end2end encrypt sms or phone calls (*FAIL*! X-D)) Putin does not have a mobile phone […]
The Age of Surveillance Capitalism: “be careful what you reveal to your friend” (the internet) https://irlpodcast.org/season4/episode5/ what if – instead of security – Google wants mass surveillance and a direct uplink to the US-Pentagon to blow all “terrorists” (basically anyone […]
KEEP BLUETOOTH OFF AT ALL TIMES! (switch it on when you need it and off when done (file transfer etc)) also saves energy on phones does usage of stylish ear bud bluetooth headsets increases security risk? (Bluetooth permanent on) this […]
https://theintercept.com/2020/04/03/zooms-encryption-is-not-suited-for-secrets-and-has-surprising-links-to-china-researchers-discover/ hm…. let me think where one has seen this before: TELEGRAM! Zoom’s service is “not suited for secrets” “The researchers also found that Zoom protects video and audio content using a home-grown encryption scheme, that there is a vulnerability […]
this really raises the question: the mobile (complete computer) phone (number) as key to everything? is it a good idea to rely on smart phones (that are essentially a very small laptop and a cellular modem) and phone numbers to […]
now WITH SPICY COMMENTS X-D SecurityLab, [22.12.19 12:40] A Twitter user using the alias 08Tc3wBB created tfp0-an exploit that allows you to jailbreak the latest iPhone models with IOS 13.3. The functionality of the exploit has already been confirmed by […]
what do you think about the CNBC documentary? 2012: Aalto Talk with Linus Torvalds: 1,5 Million Views! contains the famous “Fuck You NVIDIA” https://www.youtube.com/watch?v=MShbP3OpASA Linus Torvalds writes software since his early childhood ages and just loves programming. Without this love […]
apologize! games = windows, still ? (although there are 6000 steam games running on linux) the very first “Open Source GPU” is in the making: https://www.crowdsupply.com/libre-risc-v/m-class “The Libre RISC-V M-Class is a RISC-V chip that is libre-licensed to the bedrock. […]
https://www.youtube.com/watch?v=hRt2VYjAy4c 2013: just in case if anyone was asking if the DARPA Robot challenge was for helping mankind in space… well… that and other things. 2017: the Russians have their robot challenge as well, further fueling the arms race (spending […]
“NSO Group had been exploiting a vulnerability in its software that allowed them to compromise a phone simply by targeting it with a voice call that planted malware on the device capable of silently stealing a victim’s messages. Now, in […]
what IT can learn from nature: (src) mostly US users affected. Big Business: Big Companies and Big Money can afford Big Staff to maintain and secure their products, but they also provide Big Infrastructure (AWS, Office) and thus a single […]
“Google controls about 62% of mobile browsers, 69% of desktop browsers, and the operating systems on 71% of mobile devices in the world. 92% of internet searches go through Google and 73% of American adults use YouTube. Google runs code […]
Phone in the cloud: “telephone system in the cloud” or “telephne system as software” is the “latest shit”. SipGate Basic (in English: https://www.sipgatebasic.co.uk/ / in German: https://www.sipgatebasic.de/) gives one a local VoIP land line number. One can have: a virtual […]
look at this superb piece of Open Source software: … that is actually USED BY PEOPLE (like this one to write this article). unlike windows it comes with: life-time FREE UPDATES (!!!!!!!!!) a simple no f*****ing tiles design it comes […]
screw Qualcomm, what one wants is should work out of the box with recent Linux kernels on Open Source drivers only: Recommended tested Hardware – Superb Wifi WLAN Adapter Chipset Atheros AR9285 Mini PCIE for GNU Linux Debian 10 Ubuntu […]
it might sound strange… and even if it sucks, but if you are concerned about security, call me paranoid but: your company’s critical infrastructure SHALL NOT BE REACHABLE BY WIFI! (especially not if you are running a nuclear power plant, […]
update: 2020-05 for whatever reason the following SSHDroid app does not work anymore. please checkout the even easier to use (default port: 2222) and setup: SimpleSSHD (Easy to use SSH server) – https://f-droid.org/app/org.galexander.sshd # start the ssh server app # […]
google’s security lab “project zero“ has made itself a name. (you can subscribe to their rss feed with thunderbird.) Posted by Ben Hawkes, Project Zero (team lead) (2019-05-15) Project Zero’s team mission is to “make zero-day hard”, i.e. to make […]
more latest news on: https://puri.sm/news/ Progress has been quick and steady, and because we only use components that respect both our ethical values and your personal privacy and freedoms, you can imagine the layers of complexity that go into delivering […]
Update: USB 3.0 can interfere with WiFi “USB 3.0 has a 5Gbps signaling rate. The USB 3.0 specification requires USB 3.0 data to be scrambled and it requires spread-spectrum. The noise from USB 3.0 data spectrum can be high (in […]
looks awesome 🙂 update: how to root with Magisk and install a firewall (scroll down and behave – slave of the digital dictatorship!) “Pretty much everything you do on the phone is data-mined by Google. The mic is on listening […]
Outlook hacked by receiving an email – fax machine – hacked by receiving a fax – Android SmartPhones hacked by vieweing a picture.png (it’s a bug in the Framework/SDK) – “great” whats next?Will SmartPhones and “THE INTERNET” be doomed “unsafe” […]
with security there is no “done” it can be clearly seen that: the amounts of it-security problems is increasing of course there is no 100% security with state-actors playing “hot” “cold war” in cyberspace private-spy-companies developing exploits that then leak […]
2020-12: another reason why JavaScript SUCKS badly and websites NEED TO WORK without JS: it might “destroy” NAT security: NAT Slipstreaming allows an attacker to remotely access any TCP/UDP service bound to a victim machine, bypassing the victim’s NAT/firewall (arbitrary […]
Your mobile phone is giving away your approximate location all day long. This isn’t exactly a secret: It has to share this data with your mobile provider constantly to provide better call quality and to route any emergency 911 calls […]
one was running CyanogenMod “Beanstalk” on Samsung Galaxy S3 (i9300) for the last 2-3 years and it worked pretty well, but after a while (and a lot of Apps) it becomes unreliable/unstable. (but that is with all systems that […]