Serious security holes fixed in Opera – but Mac App Store users left at risk...
Serious security holes fixed in Opera – but Mac App Store users left at risk again | Naked Security.
View ArticleSecurity and Privacy in Healthcare IT Special track in The 26th International...
Dear all, the paper submission deadline of CBMS 2013 was extended along with its special tracks. Therefore the new deadline for paper submission of SPH2013 (a special track of the CBMS 2013) was also...
View ArticleThe 2013 World Congress in Computer Science, Computer Engineering, and...
CALL FOR PAPERS Paper Submission Deadline: March 18, 2013 The 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing July 22-25, 2013, Las Vegas, USA WORLDCOMP’13...
View ArticleSyndie
Syndie is an open source system for operating distributed forums (Why would you use Syndie?), offering a secure and consistent interface to various anonymous and non-anonymous content networks. via...
View ArticleIs DEF CON right to ask the feds to stay away? [POLL] | Naked Security
The founder of the DEF CON hacker conference has announced that members of the U.S. federal government will not be welcome to attend this year’s event. DEF CON is one of the world’s largest hacker...
View ArticleSeminar: Naim Qachri “Presentation of the Galois/Counter Mode of Operation...
March 18, 2014 – 12.45 – Computer Department Seminar Room – NO Building, 8th floor (2N8.202) Speaker : Naim Qachri (ULB) Title : Presentation of the Galois/Counter Mode of Operation (GCM)
View ArticleSecure webmail service Lavabit suspends operation, citing legal issues |...
Secure webmail service Lavabit suspends operation, citing legal issues | Naked Security.
View ArticleTop 10 Secure Coding Practices – Secure Coding – CERT Secure Coding Standards
Top 10 Secure Coding Practices Validate input. Validate input from all untrusted data sources. Proper input validation can eliminate the vast majority of software vulnerabilities. Be suspicious of most...
View ArticleGostCrypt
The Gostcrypt project has been launched at the end of 2013 as fork of the (late) Truecrypt project. Snowden’s leaks have made clear more than ever that the massive use of encryption by citizens must...
View ArticleMalwr – Malware Analysis by Cuckoo Sandbox
What is Malwr? Malwr is a free malware analysis service and community launched in January 2011. You can submit files to it and receive the results of a complete dynamic analysis back. Mission Existing...
View ArticleWatch That Windows Update: FTDI Drivers Are Killing Fake Chips
The FTDI FT232 chip is found in thousands of electronic baubles, from Arduinos to test equipment, and more than a few bits of consumer electronics. It’s a simple chip, converting USB to a serial port,...
View ArticleKeySweeper
KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back (over GSM) all keystrokes from any...
View ArticleTo Avoid Detection, Terrorists Made Messages Seem Like Spam – Slashdot
HughPickens.com writes: It’s common knowledge the NSA collects plenty of data on suspected terrorists as well as ordinary citizens, but the agency also has algorithms in place to filter out information...
View ArticlecSploit/android · GitHub
cSploit – The most complete and advanced IT security professional toolkit on Android. cSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the...
View ArticleDNS leak test
What is a DNS leak and why should I care? When using an anonymity or privacy service, it is extremely important that all traffic originating from your computer is routed through the anonymity network....
View ArticleCALL FOR PAPERS | eDemocracy
CALL FOR PAPERS | eDemocracy. e-Democracy 2015: Citizen rights in the world of the new computing paradigms 6th International Conference on e-DemocracyCALL FOR PAPERS December 10-11, 2015, Athens,...
View ArticleTeaching Encryption Soon to Be Illegal in Australia
Under the Defence Trade Control Act (DTCA), Australians could face up to ten years in prison for teaching encryption. Criminal charges will go into effect next year. The new legislation will make it...
View ArticleMIG: Mozilla InvestiGator by mozilla
Mozilla’s platform for real-time digital forensics and incident response of modern infrastructures MIG is a platform to perform investigative surgery on remote endpoints. It enables investigators to...
View ArticleMajor Flaw In Android Phones Would Let Hackers In With Just A Text
A security gap on the most popular smartphone operating system was discovered by security experts in a lab and is so far not widely exploited. It would let malicious code take over a phone instantly....
View Article
More Pages to Explore .....