Blog Archives

TrueCrypt Passes Another Audit

A German security firm audited TrueCrypt and found it “safe to use.”

StarWood Hotels, Operator of Many Major Hotel Chains, Hacked

If you’ve stayed in a hotel recently you might want to checkout the list of more than 50 hotels affected by the breach.  

How Covert Channels Drain Android’s Battery Life

MIT investigates how many popular apps, even when told not to communicate externally, use covert channels to transfer information about what you are doing.

Android Accessibility Service Can Bring Malware

Installing Apps from 3rd party stores can bring malware that exploits the Accessibility Service and can survive a full factory reset.

Swatting Can Bring 5 to Life

Sending a SWAT team to someone’s house could get you 5 to life in prison.

Amazon Enables Two Factor Authentication

You can now secure your Amazon browsing with TFA.

Comcast Leaking Names and Locations of XfinityWiFi Customers

Your Comcast-provided XfinityWiFi router may be offering WiFi to other Xfinity customers in the area.  That services seems to be leaking real names and locations to search engines.

Zero Day Exploit Cost Chart

Wired is reporting on the costs of exploits from the firm Zerodium.  WordPress and the like are the cheapest.

BadBarCode – Hacking with Bar Codes

A researcher has shown how to hack vulnerable apps using embedded special control characters.

Freeing up space with Google Photos

Soon the Google Photo App will suggest photos you can delete from your device (because they’ve been uploaded to Google) and the Google Photo Site will suggest “downgrading” the quality of your photos to save space.