According to a group of researchers from the University of Trier two critical flaw affects the oAuth 2.0 authentication protocol. The OAuth 2.0 authentication protocol is widely used on social networking sites, every day billion of users access their profiles on Facebook and Google+ using it. According to researchers Daniel Fett, Ralf KĂŒsters and Guido […]
When it comes to securing homes and businesses, a security camera is a privileged solution but it paradoxical is exposing users to further risks. A new study made by researchers from NowSecure shows that IoT vendors have yet a lot to learn in terms of security, often doing many mistakes in that area. In the […]
While there’s a heated debate over the encryption the Godfather of anonymous communication  proposes the PrivaTegrity scheme to solve the problem of online privacy. Dr. David Chaum is a well-known inventor and cryptographer that has been titled as ‘Godfather of anonymous communication’. He is back once again with a new encryption scheme to finish the […]
Silent Circle released an update for its Blackphone 1 that fixes a critical flaw in the modem. Silent Circle has released an update for its Blackphone device that fixes several security vulnerabilities, including a flaw in its modem (CVE-2015-6841) that could have been exploited by threat actors to gain full control of the mobile device. […]
A second misconfigured database has been discovered by Chris Vickery containing data of US voters, including 19 million profiles with private information on religion, gun ownership and more. A couple of weeks ago Salted Hash reported on a sensational discovery made by the security expert Chris Vickery who found a misconfigured archive containing the personal […]
@FFD8FFDB is a Twitter bot that spies on poorly configured cameras tweeting the images captured by the connected devices. There is an air of mystery when you first notice @FFD8FFDB. However, the next thing you will see is that really gets on to you. There is a strange Twitter account, @FFD8FFDB, that every few minute tweets pictures taken […]
If you login to Windows 10 using your Microsoft account you have to know that your computer automatically uploaded a copy of your recovery key. New Windows computers implement a built-in disk encryption feature that is turned on by default to protect user data in case the device is lost or stolen. Be aware, this device encryption […]
Microsoft has issued an advisory to notify customers that the private keys for an SSL/TLS digital certificate for *xboxlive.com have been disclosed. According to a security advisory published by Microsoft, the company is propagating a new certificate for the *.xboxlive.com domain because it has âinadvertently disclosedâ the certificate’s contents. Microsoft confirmed the accidental disclosure of the […]
While media announced to have found the real identity of the Bitcoin creator Satoshi Nakamoto, Australian police raided his home in Sidney. A few hours after the media indicated the Australian expert Craig Steven Wright as the possible man behind the popular name Satoshi Nakamoto, the anonymous creator of Bitcoin, the Australian Police raided his home in Sydney. […]
Learn more about the EFF scoreboard for secure, encrypted communication options online and what the future holds. Online communications have been increasing rapidly over the past few years. However, there are many incidents revealing Internet surveillance. If you think of Edward Snowden and the revelations that he had brought to the public about NSA and […]