-
MCX - a lousy substitute for proven technology
Information Security | Oct 27, 2014 - 700 Words |
MCX - a lousy substitute for proven technology
-
Beacons being deployed in NYC phone booths
Information Security | Oct 6, 2014 - 300 Words |
Advertising companies are placing Bluetooth beacons in New York City phone booths. Forbes explains this isn't quite as scary as many think.
-
Praetorian Crypto Challenge
Puzzles, Fun, Games | Aug 25, 2014 - 600 Words |
A fun set of (reasonably) quick crypto, puzzle, and hacking challenges from Praetorian.
-
Stealing user events from foreground apps on Android
Information Security | Aug 22, 2014 - 200 Words |
Quick description and demo videos for activity hijacking to steal user-entered data like passwords, credit card numbers, and check images. Includes links to USENIX paper.
-
Duo Security Bypasses PayPal 2FA for Mobile Apps
Information Security | Jun 25, 2014 - 300 Words |
Paypal mobile app authenticates, then kicks you out because it's not two-factor compliant. They show how to leverage this into non 2FA access.
-
Early look at iOS 8 configuration profile changes
Information Security | Jun 18, 2014 - 200 Words |
A quick overview of changes to iOS configuation profile settings in the current iOS 8 beta.
-
iOS Malware - Still FUDish, not quite a Real Problem (yet)
Information Security | Jun 10, 2014 - 800 Words |
A consolidated list of known malware for iOS. Depending on your definition of malware.
-
Apple ID Compromise and Device Lockout
Information Security | May 27, 2014 - 400 Words |
Recent reports of users getting locked out of their iOS devices, probably due to compromise of their Apple ID password.
-
iOS Backups are Still Broken
Random Stuff | May 19, 2014 - 500 Words |
Backing up iOS devices to iCloud is still opaque and unreliable. And iTunes Wi-Fi backups just don't work at all.
-
How much of your email goes through Google?
Information Security | May 12, 2014 - 200 Words |
Running your own server to protect the anonymity and content of your email is great, as long as nobody else you exchange messages with uses Gmail. How many of your emails are also on a Google server?
-
Dark Reading on the VZ DBIR puzzle
Puzzles, Fun, Games | May 6, 2014 - 100 Words |
Dark Reading article on the DBIR Puzzle
-
Referrer considered harmful: Leaking location of obscurely shared docs
Information Security | May 6, 2014 - 300 Words |
Shared files, hidden by the obscurity of their URLs, may be revealed to third parties if the files contain a link to an external site. The remote site can find the file via the referrer header.
-
iStupid: the indescreet SSID tool
Information Security | Jun 19, 2013 - 200 Words |
-
Hijacking accounts using unicode magic
Information Security | Jun 18, 2013 - 200 Words |
-
Apple's security strategy: make it invisible
Information Security | Jun 14, 2013 - 200 Words |
-
A chameleon for your streams
Information Security | Jun 13, 2013 - 200 Words |
-
iOS 7 and Mavericks: New feature roundup from a security perspective – Intrepidus Group - Insight
Information Security | Jun 11, 2013 - 100 Words |
-
Android Security Overview
Information Security | Jun 5, 2013 - 100 Words |
-
Skout server leaked nearly-exact location information on users
Information Security | May 31, 2013 - 200 Words |
-
Auto-updating iOS apps
Information Security | May 22, 2013 - 100 Words |
-
Two-factor authentication for Twitter: One account at a time
Information Security | May 22, 2013 - 200 Words |
-
Google Hangouts and XMPP
Information Security | May 17, 2013 - 400 Words |
-
Recovering iPhone Restrictions Passcode
Information Security | May 16, 2013 - 100 Words |
-
Social Share Privacy
Information Security | May 16, 2013 - 200 Words |
-
How To Safely Store A Password
Information Security | May 16, 2013 - 100 Words |