Tranning - Hacking

All the blog posts about education and stuff

Xenotime Attack Group Expands Activity

A known threat group targeting industrial safety systems in the Middle East is using similar attacks on industrial systems in the United States, according to new research from Dragos. The Xenotime...

Amazon Alexa Echo shared private conversation, claim married couple

It’s every Amazon Alexa owner’s worst nightmare – your private conversations not just being listened to, but shared with random contacts without your knowledge. I don’t have an voice-activated assistant in...

New PornHub Own VPN for Bypass Censor & Anonymous Surf

Worlds largest Pornography platform PornHub launched its own Virtual Private Network  (VPN) called VPNHub With unlimited bandwidth as well as free of cost. Users accessing adult contents is extremely causing so...

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate | Threatpost

After an Alexa-enabled Echo device recorded and shared a private conversation of its unknowing owners, the tech industry – and the public – is casting a wary eye on voice...

Security and Human Behavior (SHB 2018)

Security and Human Behavior (SHB 2018) I'm at Carnegie Mellon University, at the eleventh Workshop on Security and Human Behavior. SHB is a small...

Facebook, Google Policies Break GDPR …

Nonprofit 'None of Your Business' files complaints against Facebook, Google, WhatsApp, and Instagram.Privacy activists are taking aim at major tech companies they argue are noncompliant with Europe's new General Data...

Troy Hunt: Weekly Update 88

Well it's all quietened down here with Scott gone so it's back to business as usual, which means, well, it's not very quiet at all! I've been in Sydney this...

CRM and GDPR: 8 points you may have missed

We’ve all been hit with endless offers of GDPR webinars and product pitches, so I’m not going to repeat the stuff you can find there. But there are some big-picture...

More than 100 Million IoT devices potentially exposed to Z-Shave Z-Wave attackSecurity Affairs

Researchers from Pen Test Partners have conducted an analysis of Z-Wave wireless communications protocol used by millions of IoT devices and discovered that it is...

APLICATIONS

Securing IOT, Not a Mission Impossible

At the McAfee MPOWER Cybersecurity Summit in Las Vegas on Oct. 18, I had the privilege of sharing the stage with Dr. Alissa...

HOT NEWS