Security & Privacy

Take a look at our informative posts about the data safety, the ways of privacy protection, etc

Every fifth site is still using SHA-1

The SHA1 formula is certainly period “to relaxation”. At the conclusion of Feb 2017 for Bing, using the assistance of researchers in the Netherlands Centrum Wiskunde & Informatica (Center for arithmetic and Informatics) has demonstrated that it produced in 1995 SHA1 is susceptible to crash problems. That’s, a phony file can be, really created by […]

Read More

If you forgot pass from your router

The balance of the Web link depends upon the router’s configurations. If neglected code of my modem how to proceed? You are able to execute many procedures, that’ll recover use of the router and web connection, nearby network, etc. Link With a nearby and instant network, the Web can just only be achieved by placing […]

Read More

Apple and Google fixed the vulnerabilities used by the CIA

The world thrilled the main fresh “drip” arranged by Wikileaks’ news headlines. This time around the website started posting dump codenamed Container 7 comprising information on the job of the Main intellect Company (CIA). The very first book was named “Yr zero” (Yr Zero) and possesses 8761 files and documents in the shut community of […]

Read More

Zero-Day Study by RAND Corporation

A zero-day weakness – a frustration of the builders, promoting products about the tool with that the intelligence companies and hackers aren’t in a rush to depart and also the black-market. But whether or not they are helpful and just how extended to stay related? What many hackers depend on ” card ” within as […]

Read More

Wikileaks will reveal the exploits of the CIA to manufacturers

Wikileaks started posting the dump, codenamed Container 7 comprising information on the job of the Main intellect Company (CIA). The very first book was named “Yr zero” (Yr Zero) and included 8761 files and documents in the shut community of the Middle Of stereo and digital cleverness of the CIA in Langley. Ultimately, the general […]

Read More

The Creator of Stack Overflow has criticised modern password rules

Jeff Atwood, the founder of notorious online Stack Overflow, has published on his blog a detailed letter addressed to all without exception developers. His tirade Atwood titled lucidly and succinctly: “Rules of passwords is bad”. Atwood writes that modern passwords there are many different problems, but the main of them – terrible rules of these […]

Read More

What to do if Android got a virus

The virus is entrenched in the phone — a rather unpleasant thing. It can transfer your information outside to turn on the camera and microphone or even try to steal money from your Bank account. Or completely lock the phone and extort money from you for unlocking. To catch the virus easier. They are often […]

Read More

Thermal Attacks

A group of researchers from Stuttgart University and Munich University LMU has prepared an interesting report (PDF), which will be officially presented at the conference ACM CHI 2017, may 2017. Researchers have created a method of “thermal attack”, which allows you to steal other people’s PIN codes, patterns and passwords, using a thermal imaging camera. […]

Read More

Video surveillance systems and their characteristics

Monitoring cameras are camcorders employed of watching a place for the goal. They could be viewed with a protection safeguard or police force official, and are frequently attached to a saving gadget or IP community. The monitoring program was utilized by monitoring methods presently in position for that efficient safety of any home. They discovered […]

Read More