Tag Archives: Cybersecurity

Phishing with Unicode Domains by http://bit.ly/2pk366O

If I told you this could be a phishing site, would you believed me? tl;dr: check out the proof-of-concept Punycode makes it possible to register domains with foreign characters. It works by converting individual domain label to an alternative format using only ASCII characters.

from http://bit.ly/2pk366O

Selected by Galigio via Computer Borders

Why can’t Karen Sandler get the source code for her pacemaker? by https://is.gd/kXRkfk

hearth

Last week, the U.S. Food and Drug Administration threatened legal action against Abbott Laboratories after researchers demonstrated that some of its heart-monitoring devices were insecure and could be hacked. It’s not a new problem.

It’s not a new problem. The white hat hacker Barnaby Jack showed in 2011 how insulin pumps could be remotely hijacked by a hacker, and the lack of adequate cybersecurity regulations for medical devices has been well-documented.

But none of this has gotten Karen Sandler any closer to getting the source code for her pacemaker.

from https://is.gd/kXRkfk

Selected by Galigio via Computer Borders

Blackhat EU: Breaking Big Data by https://is.gd/fvOE3d

David Venable spent time as an employee of the National Security Agency”Privacy as we know it is dead”, said David Venable of Masergy Communications, as he began his talk, Breaking Big Data: Evading Analysis of the Metadata of Your Life at BlackHat Europe 2016.

from https://is.gd/fvOE3d

Selected by Galigio via Computer Borders

How To Choose A VPN (That’s Safe And Reliable) by https://is.gd/IUN1JA

From today, the Federal Government’s Metadata Retention Scheme becomes compulsory for telcos and internet service providers in Australia. This means your metadata – including text messages, location information and internet connection details – will be stored for two years and available to Government agencies to access on request without a warrant.

from https://is.gd/IUN1JA

Selected by Galigio via Computer Borders