TIPS
-
Why the tech industry needs to stand firm on preserving end-to-end encryption
Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail…
Read More » -
Researchers Expose Infrastructure Behind Cybercrime Network VexTrio
Researchers at Infoblox have released new findings on VexTrio, a large criminal enterprise that uses a set of traffic distribution…
Read More » -
Understanding Signaling System 7 (SS7)
The Signaling System 7 (SS7) is a set of protocol suite telecommunication networks used to share information across the global…
Read More » -
Ukraine claims to have hacked secrets from Russia’s newest nuclear submarine
Ukraine’s Defence Intelligence agency (HUR) claims that its hackers have successfully stolen secret files and classified data on a state-of-the-art…
Read More » -
Weekly Update 463
I've listened to a few industry podcasts discussing the Tea app breach since recording, and the thing that really struck…
Read More » -
ClickFix, infostealer disruptions, and ransomware deathmatch
Threat actors are embracing ClickFix, ransomware gangs are turning on each other – toppling even the leaders – and law…
Read More » -
Mastering Range and Speed with External Antennas
Modifying the Helium Mobile Indoor WiFi Hotspot with External Antennas for Increased Range and Speed In a world increasingly reliant…
Read More » -
Top 5 Open Source Firewall for Network Security
A firewall is a security system that is used to control network traffic and prevent unauthorized access to a network.…
Read More » -
Quelle surprise! Twitter faces criminal probe in France • Graham Cluley
A criminal investigation into Twitter has been initiated by French prosecutors, over allegations that its algorithm is manipulated for the…
Read More » -
Choo Choo Choose to ignore the vulnerability • Graham Cluley
In episode 426 of the “Smashing Security” podcast, Graham reveals how you can hijack a train’s brakes from 150 miles…
Read More »