(15/08/23) Blog 227 – Welcome Veilid – the new, open-source app framework from one of the original hacking groups
Last Friday (11/08/23) a new framework for application developers was announced at DEFCON which aims…
(14/08/23) Blog 226 – The future of (no) passwords
For many people, juggling multiple passwords becomes not only a chore, but also a systematic…
(13/08/23) Blog 225 – Checkmate – Knight ransomware posing as TripAdvisor complaint
A Security researcher at Sophos has discovered a ransomware campaign which attempts to infiltrate a…
(12/08/23) Blog 224 – Ford discloses software vulnerability in the SYNC3 infotainment system
Yesterday I posted news about how security researchers have managed to compromise a Tesla allowing…
(11/08/23) Blog 223 – Tesla:”Want those heated seats, it’s gonna cost” Hackers: “Hold my beer”
A rising trend among luxury car manufacturers is to install all the necessary fixtures and…
(10/08/23) Blog 222 – Bulletproof hosting not so bulletproof after all
<Lolek>Hosted, a domain which provided bulletproof hosting has been seized in an operation involving various…
(09/08/23) Blog 221 – Acoustic side channel attack on keyboards
A paper has been released by three University researchers which looks at side channel attacks…
(08/08/23) Blog 220 – US Hospital network forced offline after cyber attack
16 hospitals and more than 160 other medical facilities across the United States are offline…
(07/08/23) Blog 219 – New privacy tools from Google
Last week, Google announced a number of new privacy tools aimed at allowing users to…