Latest Posts with security tag

security

319 Articles 2 Followers


Messenger Apps - And what they know about you 👀

12 Jan 2021 1 minute read 0 comments Drvinjez118

As I stated in my last article, data security and privacy is an item that people are paying more and more attention to. They are looking for an alternative and considering different options. But where is the difference and how can we be sure that we...

Do you want to move away from WhatsApp?

10 Jan 2021 1 minute read 0 comments betbtc

Facebook owned WhatsApp’s Privacy Policy updates have made many people unhappy. People are just checking out what to use as an alternative and everyday my contact list count at Telegram and Signal is rising. So here is a short round up.     Data tha...

Say Bye To Whatsapp

8 Jan 2021 1 minute read 1 comment wolverine

For IOSElon musk tweeted out use signal trying to tell people essentially to bail on Whatsapp this story many people are concerned about and they're big time Whatsapp users a lot of you use whatsapp , well there's a new terms of service which appears...

Three apps that were stealing crypto undetected for more than a year

8 Jan 2021 2 minute read 4 comments Heruvim78

Security firm Intezer Labs discovered a malware that was running undetected for more than a year, using face apps and emptying wallets for thousands users, indiscriminately infecting Windows, macOS and Linux operating systems.  The remote access troj...

XRP: Why I Care What Happens To Ripple

6 Jan 2021 9 minute read 1 comment BitcoinGordon

SEC goes after XRP/Ripple, and its leaders. But, why the underhanded timing, and what is the real aim? Okay folks, so I am a day trader. Some hate what I do because they largely don't understand it. Some hate what I do because they suck at it. Others...

Arpa Chain (ARPA) Big News expected 31.12.2020

31 Dec 2020 1 minute read 0 comments Stat1c

  TECHNICAL OVERVIEW: Secure Multi-party Computation (MPC) allows a set of parties to jointly compute a function over their inputs while keeping them private. The correctness of computation is verifiable even under majority malicious condition usin...

Prime and Probe Side Channel Cache Attack Intro

26 Dec 2020 1 minute read 0 comments tyler775

As part of my job tutoring people in Computer Science, I also tutor some people in computer security. One of the things I am currently tutoring a student in is a Prime and Probe attack. This is a type of side channel cache attack: an attack on a comp...

The CISO Dilemma - When Leadership Ignores Risks

24 Dec 2020 1 minute read 0 comments Matthew Rosenquist

What should a CISO do when the executive leadership chooses to ignore critical cyber risks?  If the C-Suite and board are well informed of imperative vulnerabilities and yet choose a path to ignore security, the CISO is put in a position where they...

Update on Honeygain Stops Working, Solution and Support Reply

23 Dec 2020 1 minute read 1 comment XTRM™

A quick update for those wondering if there will be a future feature to give over those darn permissions to render built in Android and Apple security applications useless with Honeygain - reiterating that this is not a fault of Honeygain but manufac...

The SolarWinds hacks will likely dwarf the Ledger hack with future data leaks

23 Dec 2020 2 minute read 3 comments ircrp

  As the dust is slowly settling after the the recent public data leak of the Ledger hack, the recent reports on the SolarWinds hacks in the United States are reporting on several government agencies being compromised on top of an estimated up to 18,...