Category Archives: infosec

LastPass Exploit Shows That Last Password You Made Probably Wasn’t Your Last by https://is.gd/J4T5iA

LastPass is one of the most prominent password managers around. It’s extremely convenient but if it were hacked, it would be quite the pain in the arse for users. In a blog post, the company has warned that a major exploit has been discovered and outlined what action users should take immediately.

from https://is.gd/J4T5iA

Selected by Galigio via Computer Borders

How Brands Are Turning Into Algorithms by https://is.gd/ZOzVEr

istock-514570298-1248x560

In a recent AdExchanger Talks podcast, Nate Woodman of IponWeb surfaced the specter of what we might call the brand-gorithm: a proprietary algorithm unique to a brand and used to make decisions such as how much to bid on an impression or what message to serve.

from https://is.gd/ZOzVEr

Selected by Galigio via Computer Borders

How AI will shape the future of search by http://bit.ly/2npvelD

There is no doubt the search industry has evolved. Just one look at how search engine results pages are currently laid out shows how things have changed. We have come a long way from 10 blue links. But have we gone far enough? At SXSW earlier this month, information access was a hot topic.

from http://bit.ly/2npvelD

Selected by Galigio via Computer Borders

Crossing the Border? Here’s How to Safeguard Your Data From Searches by http://nyti.ms/2nnTaav

Travelers, beware: When you take your gadgets abroad, maintaining the security of the data on your devices is just as important as protecting yourself from muggers.

from http://nyti.ms/2nnTaav

Selected by Galigio via Computer Borders

The hackers in your yogurt by http://bit.ly/2neYlrH

To read the news these days is to receive frequent reminders about how easily our technology can be turned against us. We know the CIA can spy on us through our smart TVs and that criminals can infiltrate millions of personal computers, wireless routers, and other smart devices.

from http://bit.ly/2neYlrH

Selected by Galigio via Computer Borders

Link

Charming animated short on The Power of Privacy by Andrea James via logo

The Power of Privacy from Matthias Hoegg on Vimeo.

Linux Security Distros Compared: Tails vs. Kali vs. Qubes

Linux Security Distros Compared: Tails vs. Kali vs. Qubes by Thorin Klosowski via lifehacker-logo

Are you looking for the safest version of Linux? The best for your tasks?

Ask yourself why do you seek a Linux operating system with high performance in terms of security and test one of those Linux OS proposed in the link above.

I think they are the best Linux distributions today …. or does anyone have any better suggestion? If so, please write a comment below! Thank you.

If you use TAILS you should test a bit of HEADS alchemy

If you use TAILS you are certainly interested to better know HEADS because Heads isn’t simply another Linux distribution, it merges physical hardening of particular hardware platforms and flash protection attributes with a Linux boot loader in ROM as well as custom Coreboot firmware.

30450989320_f6504cb662

The key factor in Heads is represented by its steady monitoring of the boot process that allows detecting if the firmware has been changed by malware.

If this first check certifies that all is unchanged, heads uses the TPM as a hardware key to decrypt the hard disk.

The certified integrity checking of the root filesystem is really effective against exploits but it doesn’t secure the system against each possible attack but it is able to effectively divert many types of attacks against the boot process and physical equipment that have usually been ignored in conventional setups, hopefully increasing the issue beyond what most attackers are willing to spend.

c3tv-bootstraping-a-slightly-more-secure-laptop