BGU researchers have demonstrated that it is possible to compromise a driver’s private information stored in the cloud for UBI programs.
from https://is.gd/qvTFBn
Selected by Galigio via Computer Borders
BGU researchers have demonstrated that it is possible to compromise a driver’s private information stored in the cloud for UBI programs.
from https://is.gd/qvTFBn
Selected by Galigio via Computer Borders

An anonymous reader quotes a report from BleepingComputer: A new tool released on GitHub last week can help paranoid sysadmins keep track of whenever someone plugs in or disconnects an USB-based device from high-value workstations.
from https://is.gd/8Rqjgq
Selected by Galigio via Computer Borders

Your browser is no longer supported. You can still use the site, but some features may not work as expected. Please consider upgrading to one of the following browsers. Chrome, Firefox, Safari, Opera or Edge / Internet Explorer. But who’s watching what you watch?
from https://is.gd/dDYPOL
Selected by Galigio via Computer Borders
If you’ve been thinking about trying out Tor to anonymise all your web browsing, you could just download a browser and give that a spin, but it’s much more fun to make your own highly portable proxy that you can easily connect to on a whim. Enter the Raspberry Pi.
from https://is.gd/vyxA0U
Selected by Galigio via Computer Borders
Cookies, small data files used by websites to track your internet usage, pose no threat to your computer. Some cookies can, however, compromise your privacy. They can also take up space–albeit a small amount–depending on how your operating system stores and retrieves data.
from https://is.gd/Z745PT
Selected by Galigio via Computer Borders
The World Backup Day, which is another way of saying it’s a good time to safeguard your digital photos, videos, documents and emails by creating second copies, or backups, of them and storing them somewhere secure.
from https://is.gd/XBG0C6
Selected by Galigio via Computer Borders
LastPass is one of the most prominent password managers around. It’s extremely convenient but if it were hacked, it would be quite the pain in the arse for users. In a blog post, the company has warned that a major exploit has been discovered and outlined what action users should take immediately.
from https://is.gd/J4T5iA
Selected by Galigio via Computer Borders
Soon every mistake you’ve ever made online will not only be available to your internet service provider (ISP) — it will be available to any corporation or foreign government who wants to see those mistakes.
from https://is.gd/Epcuk0
Selected by Galigio via Computer Borders
Are you looking for the safest version of Linux? The best for your tasks?
Ask yourself why do you seek a Linux operating system with high performance in terms of security and test one of those Linux OS proposed in the link above.
I think they are the best Linux distributions today …. or does anyone have any better suggestion? If so, please write a comment below! Thank you.
If you use TAILS you are certainly interested to better know HEADS because Heads isn’t simply another Linux distribution, it merges physical hardening of particular hardware platforms and flash protection attributes with a Linux boot loader in ROM as well as custom Coreboot firmware.
The key factor in Heads is represented by its steady monitoring of the boot process that allows detecting if the firmware has been changed by malware.
If this first check certifies that all is unchanged, heads uses the TPM as a hardware key to decrypt the hard disk.
The certified integrity checking of the root filesystem is really effective against exploits but it doesn’t secure the system against each possible attack but it is able to effectively divert many types of attacks against the boot process and physical equipment that have usually been ignored in conventional setups, hopefully increasing the issue beyond what most attackers are willing to spend.