Next Blackhat promises to be interesting: Hackers can break Tor Network Anonimity with USD 3000 | Security Affairs. as Pierluigi Paganini, a renowned expert in Information Security says: — I confess you to be very excited to see the presentation of the two experts, as they had anticipated, with a limited budget, it is possible to track users on Tor network, so let’s imagine the capabilities of a persistent attacker with much more computational capability and with a “couple gigabit links”. — Indeed, that would be some news for the information security… Read more Hackers can break Tor Network Anonimity with USD 3000 | Security Affairs →
Making kids think about coding and loosing fear of it is something really useful to do with the spare time (if you hapen to have any, and are able to… Read more My CodeClub Assembly – Fear of Fish →
Hackers Find Open Back Door to Power Grid With Renewables – Bloomberg. Indeed, with the power grid being fed by many instead just a few sources, and some of these… Read more Bloomberg: Hackers Find Open Back Door to Power Grid With Renewables →
It is not so easy to find ones way in the post-Snowden times. A myriad of thoughts, some well thought through, some less are surfacing giving the user mostly security theater (© Bruce Schneier, I would say) and some half cooked good ideas. Now here is something, that is still in-between, but could develop into something useful, if done right. If a service provider is lavabitten to hand over their data, it is very hard to say “nay”! Therefore, all the approaches that leave mail bits and pieces freely accessible… Read more Email and its discontents – leap.se offers safety on user- and provider level →
STC selects Ericsson innovation in world’s first Zero Site deployment. This will come in handy during the Hajj season, I would assume. The question is, how to cope with… Read more STC selects Ericsson innovation in world’s first Zero Site deployment →