CyberTechTips

746 bookmarks
Custom sorting
OpenSSL Flaw Discovered: Patch Now
OpenSSL Flaw Discovered: Patch Now
In the wake of the Heartbleed flaw, a researcher finds new weaknesses in OpenSSL that could be exploited to launch man-in-the-middle attacks,
·inforisktoday.com·
OpenSSL Flaw Discovered: Patch Now
Guest Post: Is Snowden Obliged to Accept Punishment?
Guest Post: Is Snowden Obliged to Accept Punishment?
This is Secretary of State John Kerry’s answer, given May 28 on CBS This Morning: “He should man up, come back to the United States. If he has a complaint about what’s wrong with American surveillance, come back here and stand in our system of justice and make his case. But instead, he’s just sitting […]
·justsecurity.org·
Guest Post: Is Snowden Obliged to Accept Punishment?
N.S.A. Collecting Millions of Faces From Web Images
N.S.A. Collecting Millions of Faces From Web Images
The National Security Agency’s reliance on facial recognition technology has grown as it has used new software to exploit images in emails, text messages, social media, videoconferences and other communications.
·mobile.nytimes.com·
N.S.A. Collecting Millions of Faces From Web Images
PirateBox Delivers Brand New Anonymous Sharing Release
PirateBox Delivers Brand New Anonymous Sharing Release
In 2012 a device called PirateBox excited users with the prospect of anonymous wireless file-sharing anywhere, no Internet required, and at a cost of just a few dollars. Now the project has released PirateBox 1.0 and a brand new website. TorrentFreak caught up with PirateBox founder David Darts for the lowdown.
·torrentfreak.com·
PirateBox Delivers Brand New Anonymous Sharing Release
5 Common Server Setups For Your Web Application
5 Common Server Setups For Your Web Application
When deciding which server architecture to use for your environment, there are many factors to consider, such as performance, scalability, availability, reliability, cost, and ease of management. Here is a list of commonly used server setups, with a short description of each, including pros and cons. Keep in mind that all of the concepts covered here can be used in various combinations with one another, and there is no single, correct configuration.
·digitalocean.com·
5 Common Server Setups For Your Web Application
EFF to Court: There's No Doubt the Government Destroyed NSA Spying Evidence
EFF to Court: There's No Doubt the Government Destroyed NSA Spying Evidence
San Francisco - The Electronic Frontier Foundation (EFF) told a federal court today that there was no doubt that the government has destroyed years of evidence of NSA spying – the government itself has admitted to it in recent court filings. In a brief filed today in response to this illegal...
·eff.org·
EFF to Court: There's No Doubt the Government Destroyed NSA Spying Evidence
eBay Hacked, Change Your Passwords Now
eBay Hacked, Change Your Passwords Now
If you have an eBay account, it's time to change your password. The company released a statement today saying their internal and customer databases we
·lifehacker.com·
eBay Hacked, Change Your Passwords Now
How I bypassed 2-Factor-Authentication on Google, Facebook, Yahoo, LinkedIn
How I bypassed 2-Factor-Authentication on Google, Facebook, Yahoo, LinkedIn
I remember fondly two years ago, when 2-Factor-Authentication (2FA) became popular and well used across major web applications (Google, Facebook, Yahoo and others). I found, my naive sixteen year old self unable to come to terms for why the genius idea had not been thought of before. At the time, I felt that 2FA was that golden shield you could cover yourself with and defend against some of the most sophisticated phishing attacks calmly. Whilst 2FA can still be that golden shield to the critica
·shubh.am·
How I bypassed 2-Factor-Authentication on Google, Facebook, Yahoo, LinkedIn