Article: People Are Now Selling Their DNA For Money

30th October 2019

People Are Now Selling Their DNA For Money http://flip.it/JgknWN Ya, don’t do that. What happens when DNA becomes the next biometric authentication? A detective has been granted access to private…

πŸ“Œ
0πŸ’¬ read more

Article: Tesla launches Solar Roof tiles V3, now ready for primetime

28th October 2019

Tesla launches Solar Roof tiles V3, now ready for primetime http://flip.it/J4qfTS

πŸ“Œ
0πŸ’¬ read more

Article: Goodbye SMS texting, hello RCS

25th October 2019

Goodbye SMS texting, hello RCS http://flip.it/xJLalV

πŸ“Œ
0πŸ’¬ read more

Article: Discord β€˜Spidey Bot’ malware is stealing users’ data, including passwords

Discord β€˜Spidey Bot’ malware is stealing users’ data, including passwords http://flip.it/3JjS05

πŸ“Œ
0πŸ’¬ read more

Article: Rats drive tiny cars to gather Froot Loops — for science

23rd October 2019

Rats drive tiny cars to gather Froot Loops — for science http://flip.it/7AZdr0 This has nothing to do with cybersecurity but it has cute critters.

πŸ“Œ
0πŸ’¬ read more

USB VGA makes a decent SDR transmitter?

Did some research on Software Defined Radios (SDR) which can receive radio waves. A tutorial by Crazy Danish Hacker shows that Cellular SMS messages are encrypted with the cell phones…

πŸ“Œ
0πŸ’¬ read more

Article: Google quantum computer leaves old-school supercomputer in the dust

Google quantum computer leaves old-school supercomputers in the dust http://flip.it/D6bZEZ

πŸ“Œ
0πŸ’¬ read more

Google assistant & Alexa warning

Some research from Security Research Labs Warns us to be careful with Voice assistant 3rd party apps. Responses from these apps can be padded with unpronounceable characters (tilda for example)…

πŸ“Œ
0πŸ’¬ read more

MsSql Backdoor

A hard coded password has been found in older versions of MsSql. Upgrade now Details here https://www.theregister.co.uk/2019/10/22/eset_sql_server_backdoor/

πŸ“Œ
0πŸ’¬ read more

Red Team Methods

22nd October 2019

Large Organizations have developed teams to test their security. The Red team plays the role of the attacker and the Blue team is the defender. A list of red team…

πŸ“Œ
0πŸ’¬ read more