Total surveillance: hacking GSM networks over the air
In one of the previous installments of our GSM saga we mentioned an urban legend of hijacking encryption keys on the fly. It presupposes someone can clone your SIM card
977 articles
			
		In one of the previous installments of our GSM saga we mentioned an urban legend of hijacking encryption keys on the fly. It presupposes someone can clone your SIM card
			
		We’ve all seen age-based rating labels displayed prominently before the TV shows or featured on website headings, print media title pages, or theater posters. Did you know that these labels
			
		When I was in middle school a friend of mine got a computer, soon after that he got this cool program called AOL and it instantly made his house the
			
		A few months ago, we were approached by the Dutch TV show Opgelicht?!, which discusses various types of fraud. One of the subjects discussed was the “We-Cycle” phishing campaign where
			
		If your device slows down or hangs up, you are not alone. Sometimes apps refuse to open or a browser will fail to respond at a crucial time. When irritated
			
		Similar to other successful business sharks, cybercriminals are in constant search of new markets. They carry out experiments, change target audiences and provide feedback to the victims — all to
			
		When a product is built, the manufacturer typically has a lifecycle in mind in regards to how long a consumer will ideally use the device. For example smartphones are something
			
		Recently engineers who have been working to improve legacy cellular technologies, were stricken with a thought: “Why would one need a SIM card, if it’s nothing more than a protected data
			
		Hackers are attracted by any web-resource where large amounts of money changes hands, like moths to light. This is what happened with Steam and, according to Valve’s own calculations, 77,000
			
		Since last year, there is no doubt that it’s possible to take control over a connected car remotely. Despite this, we can see zero uncontrolled cars on the streets that
			
		Two-factor authentication with SMS is widely used by banking institutions. Of course, this measure works better than a mere password but it’s not unbreakable. Security specialists found out how it
			
		In a previous post, we discussed the definition of VPN (Virtual Private Network), its purpose and various use cases. Today we will review its most prevalent implementations, and their advantages
			
		During the 2016 RSA Conference in San Francisco, Kurt Baumgartner, Principal Security Researcher, Global Research & Analysis Team, discussed the need for the transportation industry to put some focus onto
			
		Cybercriminals are starting to shift their focus from stealing personal data to other actions which bring immediate profit, experts at SANS institute say. At the recent ‘The Seven Most Dangerous
			
		Please stop me if you have heard this before: ‘I don’t need a security solution for my Mac. They are super-secure and are completely immune to viruses.’ Do you believe
			
		Even if you don’t use it, it’s likely that you’ve heard of the popular microblogging site Tumblr. With its 275 million blogs, Tumblr has become a very popular social network,
			
		You may not know this, but when you request something from a search engine, buy a product from an online shop, visit your favorite blog or read the latest news
			
		At the RSA Conference in San Francisco, I sat in on a panel that raised an interesting question in the insecure big data world that we live in. Ian Amit
You know how armies typically move: first come the scouts to make sure everything is ok. Then the heavy troops arrive; at least that was how it used to be
			
		During the RSA Conference in San Francisco Stephen Balkam, Founder and CEO of the Family Online Safety Institute gave a presentation focused on the Risks, Harms and Rewards of our
			
		Nowadays PCs are protected much better than before. The up-to-date Windows 8.1 comes with a built-in firewall and a type of anti-virus protection delivered via Defender. Browser developers continue to