background preloader

Security

Facebook Twitter

Healthcare Privacy & Security Videos | CynergisTek, Inc. Brandieself added: 7 Online Privacy Tools To Deter Snooping - The Vuze BlogThe Vuze Blog. Photo by rp72, Flickr As news continues to pour out about NSA spying and surveillance programs the question of how to protect our online privacy becomes more pressing. It comes down to two choices. Either you understand and accept that your information is out there in the open and move on, or you take action and implement the use of privacy protection tools. Whether you feel that you have nothing to hide or are looking for ways to safeguard your data from marketing trackers, trollers and governments, having options to decide for yourself is a good place to start. There are many different privacy protection apps and services to choose from depending on your budget, needs and/or concerns. Because there is no one-size-fits-all you may discover that it’s more appropriate to use several at a time. Think of it as a digital privacy protection arsenal that’s tailored just for you.

Featured below are some different vendors and services that specialize in the area of online privacy. 1. 2. 3. 4. 5. 3 of the Best Radar Detector Apps | Best Radar Detectors. When it come to speed tickets, I think we can all agree that they have to be avoided at all costs first because they can really affect your wallet, because the speed tickets are never a pretty thing in one’s life and second, because they can make you paranoid whenever your radar detector is going off the charts. In order to avoid them, the best way of doing it is to buy a radar detector. However, more than one times have all of us agreed that no matter how good one is, it is simply not worth $500.

But is there a better chance to avoid speed tickets, other than using a radar detector or than driving very slow? The new innovation in the domain of radar and speed gun detectors comes in the form of an app. The saying “there’s an app for everything” is not that unreal as it may sound. There are many apps that are free and easy to use that help you detect the police and avoid spending money on useless things such as speed tickets. Cobra iRadar Detector App Escort Live. How Tor is building a new Dark Net with help from the U.S. military.

The Dark Net is and has always been under threat. This is the smart approach to take as the focus has been shifted to technology like the Tor-anonymizing network. Warnings from governments and hackers around the world have forced Tor’s decade-old secret service technology to its limits. Tor is creating the next-generation Dark Net in part to stay forward in the security race. With funding from the Defense Advanced Research Projects Agency, the U.S. military agency has been accused of designing the cutting edge of new technology. The funding that started in 2014 is a part of DARPA’s Memex project, a “groundbreaking” search engine created to better commercial giants like Google at probing the Deep Web and other often ignored area for the U.S. intelligence, military and law enforcement. Kate Krauss, Tor’s Director of Communications told the Daily Dot via email that DARPA is financing numerous projects that concentrates on improving Tor’s hidden services across “1-3 years”.

Feds warn first responders of dangerous hacking tool: Google Search. In a restricted intelligence document distributed to police, public safety, and security organizations in July, the Department of Homeland Security warned of a “malicious activity” that could expose secrets and security vulnerabilities in organizations’ information systems. The name of that activity: “Google dorking.” “Malicious cyber actors are using advanced search techniques, referred to as ‘Google dorking,’ to locate information that organizations may not have intended to be discoverable by the public or to find website vulnerabilities for use in subsequent cyber attacks,” the for-official-use-only Roll Call Release warned. “By searching for specific file types and keywords, malicious cyber actors can locate information such as usernames and passwords, e-mail lists, sensitive documents, bank account details, and website vulnerabilities.”

Bad queries It’s true that Google hacking, or “dorking,” has been used by hackers and penetration testers for years. Only you can prevent dorking. This code can hack nearly 90 percent of credit card readers in circulation. This is a facepalm moment for the credit card issues and retailers. Nearly all credit card readers in United States are still using the default password which can be easily hacked into by cyber criminals.

The passcode, set by default on credit card machines since 1990, has been exposed for so long there’s no sense in trying to hide it. It’s either 166816 or Z66816, depending on the machine. Using either of the two passwords, an attacker can gain complete control of a store’s credit card readers, potentially allowing them to hack into the machines and steal customers’ payment data. No wonder big retailers like Target and Home Depot keep on losing our credit card data to hackers. Researchers at Trustwave, a cybersecurity firm were quite flummoxed to find that retailers still use decades old passwords for credit card readers.

Device makers sell machines to special distributors. A spokesman for Verifone said that a password alone isn’t enough to infect machines with malware. RaiderSec: Resources. The following is a list of blogs, communities, or other miscellaneous resources that can provide some great reads and educational info on topics pertaining to security. Feel free to leave comments below if you think anything should be added! News Existing Vulnerability Research (what we aim to protect against): Multimedia Resources -- Site full of great resources - requires subscription (provided for free if you're a Tech student - will show you how to access it in the meetings). Amazon Security Books – Amazon is (IMHO) one of the best places for security books. -- A great resource (forum) for learning best physical security practices as well as being able to measure physical security deficiencies with standard locks.

Hacking%20-%20NMap%20Mindmap%20Reference.pdf. Ultimate Library of ICS Cyber Security Resources - SCADAhacker. Senate Torture Report Finds the CIA Was Less Effective and More Brutal Than Anyone Knew. Today the Senate Select Committee on Intelligence released the long-awaited 500-page executive summary from its $40 million report on the CIA's "enhanced interrogation" program, which senators have said documents the brutal techniques used against 119 high-level al Qaeda suspects.

The summary (pdf below), which examines only 20 CIA captives, includes previously undisclosed details about sexual threats detainees endured during interrogation sessions, including one in which an interrogator threatened to sodomize a detainee with a broomstick. The CIA also threatened to murder detainees and their families, the Senate's executive summary says.

"At least five CIA detainees were subjected to 'rectal rehydration' or rectal feeding without documented medical necessity," according to the summary. "The CIA placed detainees in ice water 'baths.' The CIA admitted that it spied on the US Senate. Read more here. The committee dissected a September 6, 2006 speech by then President George W. Hackers Steal Up To $1 Billion From Banks. NEW YORK (AP) — A hacking ring has stolen up to $1 billion from banks around the world in what would be one of the biggest banking breaches known, a cybersecurity firm says in a report scheduled to be delivered Monday. The hackers have been active since at least the end of 2013 and infiltrated more than 100 banks in 30 countries, according to Russian security company Kaspersky Lab. After gaining access to banks' computers through phishing schemes and other methods, they lurk for months to learn the banks' systems, taking screen shots and even video of employees using their computers, the company says.

Once the hackers become familiar with the banks' operations, they use that knowledge to steal money without raising suspicions, programming ATMs to dispense money at specific times or setting up fake accounts and transferring money into them, according to Kaspersky. The report is set to be presented Monday at a security conference in Cancun, Mexico. Passwords Are Terrible -- And These Companies Want To Kill Them. Imagine sitting down in front of your computer or grabbing your smartphone and being able to seamlessly log in to every account you need.

Maybe your device recognizes your fingerprint, your eyes or your heartbeat. It just knows it’s you, and not an impostor. That’s the password-free future that many tech companies envision. It just may take them a while to get there. Passwords have long been the gold standard in online and device security, and we’ve been using them for as long as we’ve had to log in to computers and accounts. The trouble is, passwords are horrible. Many people don’t use them properly. But take heart: The race to kill the dreaded password is on. This week, Qualcomm, which makes the chips for many Android smartphones, announced Snapdragon Sense ID, a new type of sensor that uses sound waves to detect 3-D details of your fingerprint. Also at Mobile World Congress, Samsung said that it had improved the fingerprint sensor on its new high-end smartphones. FACT SHEET: Cyber Threat Intelligence Integration Center. The White House Office of the Press Secretary For Immediate Release February 25, 2015 Today, the President directed the Director of National Intelligence (DNI) to establish the Cyber Threat Intelligence Integration Center (CTIIC).

The CTIIC will be a national intelligence center focused on “connecting the dots” regarding malicious foreign cyber threats to the nation and cyber incidents affecting U.S. national interests, and on providing all-source analysis of threats to U.S. policymakers. The CTIIC will also assist relevant departments and agencies in their efforts to identify, investigate, and mitigate those threats. Purpose Cyber threats are among the gravest national security dangers to the United States. Authority The CTIIC is being established under authority granted to the DNI by the Intelligence Reform and Terrorism Prevention Act of 2004 to create intelligence centers.

Relationship to Other Cybersecurity Centers The CTIIC will not be an operational center. Organizational Structure. 15 Free Android VPN Apps To Surf Anonymously. Everyone is getting more concerned about the issue of Internet security especially when making transactions via mobile. VPN (Virtual Private Network) is technology that enables you to add an extra level of security while you surf the Internet without compromising the privacy of personal data, even whilst using public WiFi networks.

There are many ways to access the region-based blocked content as well but VPN software/apps provide a handy way to do so. For the ease of Android users, I have pooled together 10 of the top free Android VPN Apps along with some bonus apps that may prove to be useful. Recommended Reading: Send Anonymous Emails: 20 Sites To Keep Your Identity Hidden 1.

With approximately 330 million downloads around the globe, Hotspot Shield is at the top of the list. 2. SecureLine VPN is a nice app developed by Avast. 3. 4. Hola Free VPN app is mainly for those who are looking for a completely free VPN android App with some striking features. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. Update: Spy agencies hacked SIM card maker's encryption. U.S. and U.K. intelligence agencies have reportedly hacked into the computer network of giant SIM card maker Gemalto and taken smartphone encryption keys potentially used by customers of hundreds of mobile phone carriers worldwide. The Gemalto hack, by the U.S. National Security Agency and the U.K. Government Communications Headquarters (GCHQ), allowed the two spy agencies to monitor a large portion of the world's mobile phone voice and data traffic, according to a story in The Intercept.

The hack was detailed in a 2010 GCHQ document leaked by former NSA contractor Edward Snowden, the story said. It's unclear how much mobile traffic the two agencies intercepted after the reported hack. Gemalto, based in the Netherlands, produces about 2 billion SIM cards a year. With the compromised encryption keys, the surveillance agencies would be able to monitor mobile communications without the approval of the carriers or foreign governments, The Intercept story said. Your cellphone sharing data. Privacy 101 | Privacy International. Did GCHQ illegally spy on you? | Privacy International. Have you ever made a phone call, sent an email, or, you know, used the internet? Of course you have! Chances are, at some point, your communications were swept up by the U.S.

National Security Agency's mass surveillance program and passed on to Britain's intelligence agency GCHQ. Because of our recent victory against GCHQ in court, now anyone in the world — yes, ANYONE, including you — can try to find out if GCHQ illegally had access to information about you from the NSA. Make your claim using one of the options below, and send it to the Investigatory Powers Tribunal (IPT) to try and find out if GCHQ illegally spied on you. Privacy International is not representing you in your claim before the IPT. You are responsible for filing your claim and following up with any requests for additional information or action that you may receive from the IPT.

If you have more questions about the campaign, read our FAQs. Spy vs. Spy Matters. Tracking Apps. Welcome to the Underground. S!Ri.URZ - Cyberfox. Google tracks you. We don't. An illustrated guide. Google. Web Privacy. Tools: Security - Forensics - Pentesting - Ethical Hacking. Relakks - Surf anonymously with VPN and proxy. Cyber Security. Ethical Hacking. GlobaLeaks. SEC THREE. Socks 24. Fundamentals of Information Security. Online Privacy Tools. Tor. Encryption. Encryption.