The Privacy BlogPrivacy, Security, Cryptography, and Anonymity

TAG | hacking

The Ashley Madison hack is putting many at risk, but there are several things we can learn from it.

·

FBI Director James Cormey says that the North Korean’s who hacked Sony were tracked because of bad operational security in their use of proxies. We saw the same thing with the take down of the Silk Road website. Few people have the skills, tools, and discipline to be 100% consistent with their anonymity. Any slip […]

· · · ·

Lizard Squad did a bad job of attacking Tor, it could have been much worse.

· · · · · ·

I have long said that privacy services are all about trust. I this article demonstrating how to use a simple web proxy to compromise the users of that proxy. Of course, the operator of the proxy is being untrustworthy, but that is the whole point. If you don’t have a reason to specifically trust the […]

· · · ·

A new APT called DarkHotel conducts very targeted attacks against executives in Asian hotels. There are several things you can do to protect yourself.

· · · · ·

Two new attacks on Tor have recently been published. One inserts malware into software updates, the other compromises bitcoin transactions.

· · · · ·

Sochi visitors entering hacking ‘minefield’ by firing up electronics | Security & Privacy – CNET News UPDATE: According to Errata security the NBC story about the hacking in Sochi total BS. Evidently: They were in Moscow, not Sochi. The hack was from sites they visited, not based on their location. They intentionally downloaded malware to their […]

· · · · ·

NSA’s TAO — Dark Reading The Internet has been buzzing with reports of the recently leaked NSA exploits, backdoors, and hacking / surveillance tools. The linked article is good example. None of this should be news to anyone paying attention. Many similar hacking tools are available from vendors at conferences like BlackHat and DefCon. We […]

· · ·

OS News has an interesting article: The second operating system hiding in every mobile phone It discusses the security implications of the fact that all cell phones run two operating systems. One is the OS that you see and interact with: Android, iOS, Windows Phone, BlackBerry, etc. The other is the OS running on the baseband […]

· · ·

Welcome to episode 13 of our podcast for September, 2013. In this episode I will talk about: A major security breach at Adobe How airplane mode can make your iPhone vulnerable to theft Russian plans to spy on visitors and athletes at the winter Olympics Whether you should move your cloud storage to the EU […]

· · · · · · ·

Older posts >>