Quantcast
Channel: Security – Dark Views
Browsing latest articles
Browse All 16 View Live

Image may be NSFW.
Clik here to view.

CVE Changes Counter

The Common Vulnerabilities and Exposures or CVE is a registry for security related flaws and computer systems. The old counting system allowed only for 9’999 bugs per year. That’s no longer enough....

View Article


Image may be NSFW.
Clik here to view.

Overview Of Man in the Middle Attacks

David Blake posted a current overview of Man in the Middle type attacks: 15 Surprising Ways You Could Fall Victim to a Man in the Middle Attack These include: Key-loggers (hard- and software) Browser...

View Article


Image may be NSFW.
Clik here to view.

Google Shares Your WLAN Passwords with NSA

If you “Back up my data” is enabled on your Android phone, then Google keeps a clear-text, unencrypted copy of your WLAN passwords on its servers. Since Google is an US company, the government and its...

View Article

Image may be NSFW.
Clik here to view.

HTML5 vs. Security

“HTML5 vs. Security” was a talk given by Thomas Röthlisberger of Compass Security AG which gave a nice overview over some of the security problems that HTML5 brings. Areas covered by the talk:...

View Article

Image may be NSFW.
Clik here to view.

Good Summary of Heartbleed

This article contains a good summary of the Heartbleed bug and it’s consequences. Want to know whether you’re affected? Check sites you use here: filippo.io/Heartbleed/ Note: You will want to check the...

View Article


Image may be NSFW.
Clik here to view.

Balancing Security

For your IT security, you want Security It must be cheap And comfortable Now choose at most two. As always in life, everything has a cost. There is no cheap way to be secure which is also comfortable....

View Article

Image may be NSFW.
Clik here to view.

Surveillance Produces Blackmail Instead of Security

They say that “good” people have nothing to hide and, therefore, nothing to fear from surveillance. Everyone of us has something to hide. When we are confronted with out dark side, immediate, temporary...

View Article

Image may be NSFW.
Clik here to view.

When Uncle Doc Gets Hacked

Most of the time, when users get infected with a computer virus or a Trojan, it’s a nuisance. But what happens when an important person becomes a victim of a cracker like your doctor? How about this...

View Article


Image may be NSFW.
Clik here to view.

Virtual Cables for IoT Devices

IoT devices are a security nightmare: They should be easy to use / set up but hard to hack. With classic devices, the solution is “cable”. If there is no cable between two devices, they can’t talk to...

View Article


Key Escrow that Might Work

Instead of encrypting everything with a single government key, several government agencies need to provide new public keys every day. The private key must be under the control of a court. Each secure...

View Article
Browsing latest articles
Browse All 16 View Live