I once tried to start to use passwords which were immune to exhibitionism, that means that even when someone average would happen to see them on the screen or otherwise were not able to reproduce them at least with no hard effort. This lead me to use full scale of Unicode charset, specifically nonlatin characteres.
Snowden, North Korea and iOS, this could be seen as the finalizing or resulting “menage a trois” from the HOPE conference in New York 2014. In addition it was the most populous meeting in series as they reported, due to the first thing mentioned here, perhaps, but also maybe because of some other matters. After
This is to report and reflect the experiences and content of the recent Area41 security conference in Zürich in June 2-3. The conference was held in the old industrial building used for concerts and other cultural incidents, but also one of the session rooms used to be the venue for strip club (however of whose
Covert channel are used to transfer information between processes that aren’t allowed to communicate as define by computer security policy. Information transmitted in such form are often not transmitted through legitimate transfer mechanism. A recent published paper by Fraunhofer FKIE – On Covert Acoustical Mesh Networks in Air – demonstrated a new way to transmit
Charlie Miller and Chris Valasek demonstrated how they took control of a computerised automobile using their laptop at DEF CON 21 Hacking Conference last week. Miller and Valasek were sponsored by the Defence Advanced Research Projects Agency (DARPA) to research on the vulnerabilities and threats posed to modern cars. In their demonstration, Miller and Valasek