“In June of this year, “Ripple20” (not only) shook the Internet of things: 19 vulnerabilities in a TCP/IP Stack for Embedded devices made “hundreds of millions” devices vulnerable, according to their discoverers. Now, Stack analysis by another team of researchers […]
Overview Recent 360Netlab unknown threat detection system to capture to a group of unknown malicious families of the sample, which a number of samples supported CPU architectures are x86(32/64), ARM(32/64), MIPS(MIPS32/MIPS-III) as well as PPC, after our analysis, which is […]
contains advertisement. to be honest, it is hard to keep up the speed at which cyber incidents are reported. here is the latest take on “Russian IT Sec Updates”. have phun! SecurityLab, [28.09.20 08:20] Last month, TikTok developers rolled […]
SecurityLab, [14.07.20 15:35] The Electronic Frontier Foundation (EFF) has unveiled a new database demonstrating how and where us law enforcement agencies use tracking technologies. A map of the use of tracking technologies in the United States is presented (https://www.securitylab.ru/news/510018.php) SecurityLab, […]
All SmartPhones are spies! that’s why Merkel keeps the Nokia from 1995 (even if that device is spied on as well, because it can not end2end encrypt sms or phone calls (*FAIL*! X-D)) Putin does not have a mobile phone […]
The Age of Surveillance Capitalism: “be careful what you reveal to your friend” (the internet) https://irlpodcast.org/season4/episode5/ what if – instead of security – Google wants mass surveillance and a direct uplink to the US-Pentagon to blow all “terrorists” (basically anyone […]
The Great A.I. Awakening: A Conversation with Eric Schmidt Feb 23, 2017 as user might have noticed, the battle Amazon vs Microsoft who will get the $10Billion DoD cloud computing contract is still hot. And maybe the contract is split. […]
guess with it-security and internet-security (internet = roads, cars = computers that users use every day) it is like with real-life-security – there is no 100% security. all users of a system are in constant potential danger of having an […]
Tor is easier to use than ever just get the tor bundle – it is tor bundled with firefox https://www.torproject.org/download/ Is Tor essentially an NSA honeypot? in other words: is the NSA running a lot of (modified to their tracking […]
this is why high quality journalism and education are sooooo important: trust is so important & journalism should be about truth and trust context: media outlets that use numbers out of context (do those numbers apply to the US, or […]
As with all hot debated topics: Linus Torvald’s “show me the source” in this case, the source of one’s informations (always give the source!) is IMPORTANT for the information’s credibility. It is absolutely vital in science to give all sources […]
now WITH SPICY COMMENTS X-D SecurityLab, [22.12.19 12:40] A Twitter user using the alias 08Tc3wBB created tfp0-an exploit that allows you to jailbreak the latest iPhone models with IOS 13.3. The functionality of the exploit has already been confirmed by […]
Update! .org NOT FOR SALE! send ICANN a thank you card! 🙂 resistance takes enormous amount of effort! but it works! democracy ain’t dead yet! and then: CELEBRATE! CELEBRATE! CELEBRATE! 🙂 (do a little wiggle dance whatever!) X-D “Today, the […]
new Russian IT Security updates: thanks to https://www.securitylab.ru/ and https://translate.yandex.com/ SecurityLab, [06.11.19 16:12] The Libarchive compression library, which is included by default in Debian, Ubuntu, Gentoo, Arch Linux, FreeBSD, and NetBSD distributions, contains a vulnerability that allows an attacker […]
Another reason to NOT trust EVERY human task to machines… unless one wants to get killed by a robot dressed up as dinosaur. “great” X-D “Japanese travel agent H. I. S. Group ignored warnings about a vulnerability in its Tapia […]
update: Emotet trying to spread by WIFI since 2018 https://thehackernews.com/2020/02/emotet-malware-wifi-hacking.html BUT ALSO VIA PDF! on the heise security conference last year was said: Virus Scanners since around 10 years are not sufficient anymore. (heise a computer focused news outlet […]
what IT can learn from nature: (src) mostly US users affected. Big Business: Big Companies and Big Money can afford Big Staff to maintain and secure their products, but they also provide Big Infrastructure (AWS, Office) and thus a single […]
THE ECB BIRD WAS HACKED! “however, the internal system of the Bank has not been compromised” the site http://www.banks-integrated-reporting-dictionary.eu/ was taken offline. It is fascinating. The Europeans probably do not even know about “what is going on” and according to ex […]
Why is quantum computing important: optimization Update: Google claims to have reached quantum supremacy The tech giant unveiled its x-quantum computer chip Bristlecone in March 2018 (src: cnet) original nasa paper: https://drive.google.com/file/d/19lv8p1fB47z1pEZVlfDXhop082Lc-kdD/view book: https://deepai.org/machine-learning/researcher/eleanor-g-rieffel https://www.amazon.com/Quantum-Computing-Introduction-Engineering-Computation/dp/0262015064 Scott’s Supreme Quantum Supremacy FAQ! […]
Capitalism inspires the short sighted incentives. But trust and honesty is key in long term relationships. So for a short period of time – some dishonest people might enjoy the benefits – but in the end – it comes home […]
don’t be evil “Google controls about 62% of mobile browsers, 69% of desktop browsers, and the operating systems on 71% of mobile devices in the world. 92% of internet searches go through Google and 73% of American adults use YouTube. […]
it might sound strange… and even if it sucks, but if you are concerned about security, call me paranoid but: your company’s critical infrastructure SHALL NOT BE REACHABLE BY WIFI! (especially not if you are running a nuclear power plant, […]
servers/clients/computers/programs/services/webservers need accurate time… they usually get it from time servers that have an atomic clock attached to their USB port. (just guessing) ping time.google.com PING time.google.com (216.239.35.4) 56(84) bytes of data. 64 bytes from time2.google.com (216.239.35.4): icmp_seq=1 ttl=46 time=43.5 […]
Pwn2Own 2020: opening a pdf can be enough to compromise system! https://youtu.be/u1udr7j9MQA?t=359 thank you ccc you are doing a lovely work – make this planet more interesting by creativity and more informed about security 🙂 keep it up 🙂 https://cdn.media.ccc.de/events/gpn/gpn19/h264-hd/gpn19-45-eng-BADPDF_-_Stealing_Windows_Credentials_via_PDF_Files_hd.mp4 […]
ONLY BUY FROM HARDWARE VENDORS THAT SUPPORT OPEN SOURCE! (release the sources for their drivers and documentation for their hardware) had to swap the Wifi card on both LibreBooted Lenovo x60s for Atheros ar5b95 Wireless WiFi WLAN Karte für HP […]
scroll down for ENGLISH: ) OMG! Da die IT von Baltimore sich einen Ransome-Virus eingefangen hat, können die Bürger ihre Steuern und ihre Blitzer-Tickets nicht zahlen! Wunderbar! 🙂 Mit welchem Aufwand man rechnen muss, wenn man sich von der Digitalisierung […]
google’s security lab “project zero“ has made itself a name. (you can subscribe to their rss feed with thunderbird.) Posted by Ben Hawkes, Project Zero (team lead) (2019-05-15) Project Zero’s team mission is to “make zero-day hard”, i.e. to make […]
20-30% of positive ratings as well as negative ratings (to make competition look bad) are fake! according to gallileo magazine this website tries to filter/debunk the fake from the real ratings: https://reviewmeta.com/
this is probably the most evil way of social engineering: fear makes a lot of money – but it can even kill already traumatized people. It works like this: criminals create fake profiles on dating sites / facebook / twitter […]
“The cost to companies from malware and “malicious insider”-related cyberattacks jumped +12 percent in 2018 and accounted for one-third of all cyberattack costs, according to new research published today by Accenture and the Ponemon Institute.” src: helpnetsecurity.com logical consequence: stop […]