This article originally appeared in Sophos' Naked Security blog. It is written by John E Dunn. #------- ------- ------- Air-gapping important computers and data is a security idea that has run its course and urgently…
All Your Credit Card Processing Are Belong To…
In a digital age, with convenience constantly toppling security as a priority, from our security focused mindsets, cash as a primary source of tender is tempting. https://www.wired.com/story/fin7-wild-inner-workings-billion-dollar-hacking-group/ THE WILD INNER WORKINGS OF A BILLION-DOLLAR HACKING…
US Suspects Cellphone Spying Devices in DC
This article states this is the first time "the U.S. government has publicly acknowledged the existence in Washington of what appear to be rogue devices that foreign spies and criminals could be using to track…
EA Created An AI That Taught Itself To…
This article is taken from kotaku.com, and is written by Luke Plunkett. We are posting this here because it is provides great insight into the times to come. Electronic Arts’ Search for Extraordinary Experiences (SEED)…
The Poor Man’s Facial Recognition and Profiling
Not everyone can afford to purchase facial recognition solutions. Even navigating into the industry websites can be daunting, as one tries to determine industry lingo, what features each solution offers, how these systems can be…
Tor’s Tips On Staying Anonymous
The key to staying anonymous is understanding security is about layers, which is a great concept given we are talking about TOR. In addition to understanding security is about layers, one must also determine where…
The Venezuelan Government Is Doing an Ethereum Token…
I am not sure why, but I would imagine this venture will have a difficult time finding worthwhile investors. Anyone would simply have to ask themselves, "Do the people behind this have any sort of…
New Tool Automatically Finds and Hacks Vulnerable Internet-Connected…
Perhaps the best quote from this article is from Richard Bejtlich, "This will end in tears." Motherboard's article, "New Tool Automatically Finds and Hacks Vulnerable Internet-Connected Devices" provides a good quick snapshot of the situation. …