An expert presented his study on hijacking high-end drones commonly deployed by government and law enforcement agencies. The researcher Nils Rodday presented at the annual RSA conference in San Francisco the findings of its study on hacking drones. Rodday, who currently at IBM, has conducted his research while working as a graduate researcher at the University of Twente […]
French Gov is thinking a law that would impose fines of €1 million on Apple and Google if they refused providing access users’data. Governments worldwide continue to intensify their pressure on the IT giants requesting the access to users’ data in the name of security. The US Government wants Apple unlock its mobile devices to access data, the […]
While discussing the San Bernardino shooter’s iPhone, Apple executives said the password changed while it was under the government custody. The discussion about the San Bernardino shooter’s iPhone has monopolized media in this week, a US magistrate ordered Apple to help unlock the mobile device, but the company refused to do so. A new shocking […]
A US magistrate ordered Apple to help unlock San Bernardino shooter’s iPhone, be aware it is demanding a tool to bypass the security mechanism. We discussed very often of the difficulties of the law enforcement in conducting investigations when suspects used devices that make use of encryption, the case that we are going to analyze is emblematic. Apple […]
The FBI requests $38 Million to counter the threat of Going Dark, in particular asking more economic resources to break encryption when needed. The FBI Director James Comey has highlighted in different occasions the difficulties faced by law enforcement when dealing with encryption during their investigations. Now, the FBI is making its request for budget […]
Developers of OpenSSL issued a patch that fixes a high-severity vulnerability that allows attackers to decrypt secure traffic. The development team at the OpenSSL has issued a security patch to fix a flaw, coded as CVE-2016-0701, that could be exploited by hackers to decrypt secure traffic. The flaw was reported on January 12 by Antonio Sanso […]
It has been fixed the OpenSSH vulnerability that can be exploited to steal crypto keys from vulnerable clients. Recently a critical vulnerability in OpenSSH has been fixed, the flaw can leak secret cryptographic keys. The flaw affects end users version of OpenSSH and not server side implementations. Many experts compared the effects of this flaw to the […]
The IS has developed an Android app dubbed Amaq Agency app demonstrating how powerful modern communications technology can be for a radical group. Which are the communication channels used by members of the ISIS? Which are the messaging services they use? These are the main questions for the Western Intelligence that is attempting to track […]
If you login to Windows 10 using your Microsoft account you have to know that your computer automatically uploaded a copy of your recovery key. New Windows computers implement a built-in disk encryption feature that is turned on by default to protect user data in case the device is lost or stolen. Be aware, this device encryption […]
Ghost Security Group has reportedly discovered an Android mobile application used by members of the ISIS organization for secure communications. According to the Christian Science Monitor, the Ghost Security Group has reportedly discovered an Android mobile app used by members of the ISIS organization. The Ghost Security Group is the notorious group of cyber experts in counter-terrorism networks that is […]