Tag Archives: security tips

How to Enable/Disable ‘Location Tracking’ on ‘Opera’ browser? by https://is.gd/1vhof9

Opera Browser

A brief but effective tutorial about Enabling and/or Disabling ‘Location Tracking’ on ‘Opera’ browser.

from https://is.gd/1vhof9

Selected by Galigio via Computer Borders

Phishing with Unicode Domains by http://bit.ly/2pk366O

If I told you this could be a phishing site, would you believed me? tl;dr: check out the proof-of-concept Punycode makes it possible to register domains with foreign characters. It works by converting individual domain label to an alternative format using only ASCII characters.

from http://bit.ly/2pk366O

Selected by Galigio via Computer Borders

Why can’t Karen Sandler get the source code for her pacemaker? by https://is.gd/kXRkfk

hearth

Last week, the U.S. Food and Drug Administration threatened legal action against Abbott Laboratories after researchers demonstrated that some of its heart-monitoring devices were insecure and could be hacked. It’s not a new problem.

It’s not a new problem. The white hat hacker Barnaby Jack showed in 2011 how insulin pumps could be remotely hijacked by a hacker, and the lack of adequate cybersecurity regulations for medical devices has been well-documented.

But none of this has gotten Karen Sandler any closer to getting the source code for her pacemaker.

from https://is.gd/kXRkfk

Selected by Galigio via Computer Borders

Blackhat EU: Breaking Big Data by https://is.gd/fvOE3d

David Venable spent time as an employee of the National Security Agency”Privacy as we know it is dead”, said David Venable of Masergy Communications, as he began his talk, Breaking Big Data: Evading Analysis of the Metadata of Your Life at BlackHat Europe 2016.

from https://is.gd/fvOE3d

Selected by Galigio via Computer Borders

How To Choose A VPN (That’s Safe And Reliable) by https://is.gd/IUN1JA

From today, the Federal Government’s Metadata Retention Scheme becomes compulsory for telcos and internet service providers in Australia. This means your metadata – including text messages, location information and internet connection details – will be stored for two years and available to Government agencies to access on request without a warrant.

from https://is.gd/IUN1JA

Selected by Galigio via Computer Borders

Tech Underestimates Future Demand for Privacy by https://is.gd/dDYPOL

binary-1327493_640

Your browser is no longer supported. You can still use the site, but some features may not work as expected. Please consider upgrading to one of the following browsers. Chrome, Firefox, Safari, Opera or Edge / Internet Explorer. But who’s watching what you watch?

from https://is.gd/dDYPOL

Selected by Galigio via Computer Borders

How To Anonymise Your Browsing With A Tor-Powered Raspberry Pi by https://is.gd/vyxA0U

If you’ve been thinking about trying out Tor to anonymise all your web browsing, you could just download a browser and give that a spin, but it’s much more fun to make your own highly portable proxy that you can easily connect to on a whim. Enter the Raspberry Pi.

from https://is.gd/vyxA0U

Selected by Galigio via Computer Borders