Secure Erasing Android Devices Guide for the Super Paranoid Seller.
Any of my friends would tell you that I’m crazy paranoid about malicious users–especially when I sell off my old electronics. I’m the type of guy who’d prefer to put a nail through an old device....
View ArticleMalicious Apps Can Make Android Phones Useless
Security researchers said they have uncovered bugs in Google’s Android operating system that could allow malicious apps to send vulnerable devices into a spiral of endlessly looping crashes and...
View ArticleMoney Laundered through Online Gambling Sites
A new report by McAfee sheds light on the underground world of online gambling. It identifies the proliferation of online casinos, an industry set to grow nearly 30 percent over the next three years,...
View ArticlePirated ‘Watch Dogs’ Game Made A Bitcoin Mining Botnet
Pretty smart idea this one, we wrote about Yahoo! spreading Bitcoin mining malware back in January, but we haven’t really seen any of that type of activity since then. But this, this is a much better...
View ArticleYes, your smartphone camera can be used to spy on you…
Yes, smartphone cameras can be used to spy on you – if you’re not careful. A researcher claims to have written an Android app that takes photos and videos using a smartphone camera, even while the...
View ArticleCybercrooks Breed Self-Cloning Mutant That Steals Your Bank Details
Cybercrooks have put together a botnet client which bundles in worm-like functionality that gives it the potential to spread quickly. Seculert warns that the latest version of the Cridex (AKA Geodo)...
View ArticleHacking Your Fridge – Internet of Things Security
So one of the latest fads is IoT or the Internet of things phenomena which has been talked about for a while (especially since the discussion of IPv6 started), IoT is connecting physical items to the...
View ArticleClear Your Cookies? You Can’t Escape Canvas Fingerprinting
So tracking is getting even trickier, it seems canvas fingerprinting would work in any browser that supports HTML5 and is pretty hard to stop as a user, as it’s a basic feature (a website instructing...
View ArticleThe Fundamental Insecurity of USB
p>This is pretty impressive: Most of us learned long ago not to run executable files from sketchy USB sticks. But old-fashioned USB hygiene can’t stop this newer flavor of infection: Even if users...
View ArticleHow To Dissect Android Simplelocker Ransomware
In this blog post we’ll be looking at a new type of malware for Android phones that encrypts important files and demands the user pay a ransom to regain access to their phone. This is the first...
View ArticleMousejacking – what you need to know
US startup Bastille Networks boldly claims to be “the first and only company to completely secure the Enterprise,” even though it doesn’t have any products on its website yet. But it is nevertheless...
View ArticlePetya: Disk Encrypting Ransomware
Updated 2016-04-03: Edited to add more details about the encryption scheme. Petya is a new ransomware with an evil twist: instead of encrypting files on disk, it will lock the entire disk, rendering it...
View ArticlePetya key decoder
I made a decoder for key of Petya ransomware. It works for Stage 1 of encryption – if the system was not rebooted after the infection. Research about a possibility to decrypt Stage 2 is in progress....
View ArticleCheating in Marathon Running
Story of Julie Miller, who cheated in multiple triathlon races: The difference between cheating in 1980 and cheating today is that it’s much harder to get away with now. What trips up contemporary...
View ArticleWhy you can’t trust things you copy and paste from web pages
Put away your wget and curl, your SOAP clients and WSDLs, WebDAV servers, REST APIs and JSON callbacks; when it comes to moving data off websites and on to your computer the sticky stuff that greases...
View ArticleDecrypting the WhatsApp Database
INTRODUCTION WhatsApp Messenger is an application used across various Mobile Platforms for instant messaging. It uses the internet to send and receive audios, videos, documents, location details,...
View ArticleHacking Your Computer Monitor
Here’s an interesting hack against a computer’s monitor: A group of researchers has found a way to hack directly into the tiny computer that controls your monitor without getting into your actual...
View ArticleSeriously, Put Away The Foil
I was scanning the headlines this morning, as I do, and came across this article by YLE Uutiset (News). — “Finnish police: Keep your car keys in the fridge” From YLE’s article: “These so-called smart...
View ArticleNoScript is harmful and promotes Malware!
NoScript proudly calls itself a security extension advertising itself as an extension with “whitelist based pre-emptive script blocking approach prevents exploitation of security vulnerabilities (known...
View Article5900 online stores found skimming [analysis]
Update Oct 17th: already 841 stores have been fixed! Thanks to everybody who tirelessly notified and fixed stores. Update Oct 14th: Github has booted my data and I have moved to Gitlab (statement from...
View Article