An App Keeps Spies Away from Your iPhone. Anytime you use your phone to make a call or send an e-mail or text message, there’s a chance it will be intercepted by someone who has access—legal or otherwise—to your providers’ servers.
A new app called Silent Circle tries to change that by encrypting calls, e-mails, and texts. It’s aimed at activists, companies, and individuals who fear they’re being spied on. Silent Circle is also the name of the company behind the app. L'EFF invite à chiffrer toutes ses communications, dès maintenant. Tails : A propos. Pour utiliser Tails, éteignez l'ordinateur et démarrez-le sur votre clé USB Tails à la place de Windows, macOS ou Linux. Vous pouvez transformer temporairement votre propre ordinateur en une machine sécurisée. Cryptoparty goes viral - Crypto. CRYPTO 2012 : Day One. The annual return of cryptographers to sunny Santa Barbara started today.
The morning was dominated by an excellent invited talk by Jonathan Zittrain entitled "The End of Crypto". The talk gave an interesting initial presentation of the history of computers and networks. In terms of computers before the advent of the PC there was essentially two models. Apple zombie malware ‘NetWeird’ rummages for browser and email passwords. When we write Naked Security articles about Mac malware, we often end up creating a bit of a stir.
Usually that's not on account of the malware itself, but on account of us writing about it in the first place. Here's how it goes down. We write the article. Awareness : Embedded Hardware Dangers. You Are Not Anonymous, Nothing Is Secure. We’ve had the opportunity to have a chat with a former member of the infamous TeaMp0ison collective who has been recently raided by authorities.
Although he has asked us not to reveal his true identity because the case is sealed, he wants to get his message out to all the black hats who are still active on the hacking scene. “I got raided on June 26 by 16 FBI agents, 2 special agents and 2 helicopters at 6AM. On the same day, 30 other, including Cosmo and JoshTheGod were raided. They had search warrants for electronics pertaining to TeaMp0isoN, Anonymous, Guy Fawkes and a hacking forum,” he started his story. FinSpy : le spyware britannique vendu à des régimes autoritaires ? L'an dernier, nous avions relayé un article d'Owni qui détaillait les redoutables promesses de la suite d'outils britannique FinFisher, présentée comme un mouchard mis à disposition des services de police.
FinSpy "peut espionner en 'live' le ou les utilisateurs de l'ordinateur infecté (en activant, à leur insu, webcam et microphone), mais également le géolocaliser, en extraire toutes les données, intercepter les échanges de mail et autres conversations, et notamment les appels et transferts de fichiers effectués avec Skype", écrivait Owni. Aujourd'hui, des indices extrêmement sérieux permettent de penser que Gamma, l'éditeur de FinSpy, a vendu son logiciel à des régimes autoritaires qui l'ont utilisé pour espionner des dissidents et faciliter la répression. En plus des ordinateurs sous Mac, Windows ou Linux, le spyware peut infecter quasiment tous les mobiles du marché, avec des versions destinées aux iPhone, Android, BlackBerry, Symbian (Nokia), ou encore Windows Phone. Une vie numérique détruite en trois coups de téléphone.
Cryptoparties, danger, and why you (the hacker) should help. Recently, cryptoparties have “gone viral” the world over.
In short, they are gatherings where people with knowledge of crypto take the opportunity to spread that knowledge to others who has a need and/or interest, such as journalists, activists etc. However, I hear from one of the originators, Asher Wolf, that the wiki has been changed by “experts”, who claim that “crypto is dangerous” in various ways. I will attempt to address these concerns quickly: Crypto, done wrong, leads to a false sense of security. « Données personnelles et vie privée », Réseaux, n°167, 2011. 1 « Les nouvelles frontières de la vie privée », Legicom n°43, Victoires Éditions 2009 2 A.
Türk, La Vie privée en péril. Sécurité des noms de domaines : un tutoriel indispensable. J'ai régulièrement parlé dans ce blog du DNS, le Domain Name System, qui constitue un maillon essentiel des services Internet : sans lui, plus de web, plus d'e-mail, plus de transferts de fichiers... Mot de passe, bien les choisir et bien les utiliser. Bien choisir et bien utiliser son mot de passe est un problème plus important qu’il n’y parait.
C’est un sujet qui a beaucoup été traité mais où l’on a rarement proposé des solutions simples. Skype hands 16-year-old's personal information to IT company. AMSTERDAM - Skype illegally distributed a user's personal information to a private company during a police investigation into Anonymous-sanctioned cyberattacks on PayPal.
Foto: AFP Dit artikel is oorspronkelijk verschenen in het Nederlands. It and several other payment companies were attacked out of retribution for blocking donations to Wikileaks in 2011. dCode.fr - Solveurs, Cryptographie, Décodage, outils en ligne. Privacy 101: privacy, anonymity and you. This is a double guest post, incorporating two separate presentations from the recent Melbourne Crytoparty event.
Cryptoparties are grass-roots data security education activism – CryptoParties are free to attend, public, and are commercially non-aligned. Some of the information provided below is specific to Australian law; find a Cryptoparty MeetUp local to you if you want to check your specific legalities (follow the proceedings online if you can’t get to the MeetUp itself). Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn’t want the whole world to know, but a secret matter is something one doesn’t want anybody to know. GeorgieBC first explains why privacy is necessary for all of us, then Sarah Stokely expands on privacy matters and outlines the basics of using Tor as one of the tools for online privacy. Petit manuel de contre-espionnage informatique. GPS, téléphones portables, logiciels espions: les outils de la surveillance se démocratisent.
Another reason not to use corporate software: Your bosses are spying on you — Cloud Computing News. Comment identifier un blogueur anonyme ? En exploitant YouTube. A game for kids about privacy. General Security: Security Culture. Destroy Internet Tracking Files With PrivacyScan. Editor’s note: The following review is part of Macworld’s GemFest 2012 series. Every weekday from mid June through mid August, the Macworld staff will use the Mac Gems blog to briefly cover a favorite free or low-cost program. Visit the Mac Gems homepage for a list of past Mac Gems. All Web surfers know—or should know—that even though they often use the Internet in the privacy of their homes, they are not alone. The Web, while a window to the universe, is also a conduit for transmitting private and personal information to prying eyes. Marketers track your every move with a variety of digital markers, such as cookies, Web Bugs, or clear GIFs.
SecureMac’s PrivacyScan (Mac App Store link), which debuted at Macworld|iWorld 2012, offers a one-stop way to mitigate common privacy concerns by identifying and destroying Internet files placed on your computer that track your usage and reveal your online activities to others. Piratage et divulgation de données : la négligence inacceptable des entreprises. Security is not my responsibility. A new PhishMe survey via OnePoll conducted among 1000 UK office workers shows that most people have different attitudes toward security depending on whether they are at home or at work.
“We have found that workers are not connected to protecting their corporate assets,” explains Aaron Higbee, PhishMe’s CTO. “They believe it’s the security team’s job to protect them from all outside threats, and that security products alone can protect the ‘corporate crown jewels’. However, it’s a different case when it comes to people protecting their own data on their mobile devices or home computers – our experience shows that people are far more likely to be on their guard when looking at emails at home because they have far more to lose than at work.”
The implications are far-reaching. Phishing itself can be divided into two categories: mass phishing and spear-phishing. Google Declares War on the Password. Google is running a pilot project to see if these USB-based Yubico log-on devices might help it solve the password problem. Photo: Google MOUNTAIN VIEW, California — Want an easier way to log into your Gmail account? How about a quick tap on your computer with the ring on your finger? This may be closer than you think. Google’s security team outlines this sort of ring-finger authentication in a new research paper, set to be published late this month in the engineering journal IEEE Security & Privacy Magazine. 2012 may have been the year that the password broke. The guys who hacked Honan last August deleted his Gmail account. L'identifiant Facebook pour se connecter aux services gouvernementaux britanniques ?
Tor - The Onion Router. Why passwords have never been weaker—and crackers have never been stronger. In late 2010, Sean Brooks received three e-mails over a span of 30 hours warning that his accounts on LinkedIn, Battle.net, and other popular websites were at risk. He was tempted to dismiss them as hoaxes—until he noticed they included specifics that weren't typical of mass-produced phishing scams. The e-mails said that his login credentials for various Gawker websites had been exposed by hackers who rooted the sites' servers, then bragged about it online; if Brooks used the same e-mail and password for other accounts, they would be compromised too. The warnings Brooks and millions of other people received that December weren't fabrications. Within hours of anonymous hackers penetrating Gawker servers and exposing cryptographically protected passwords for 1.3 million of its users, botnets were cracking the passwords and using them to commandeer Twitter accounts and send spam.
Newer hardware and modern techniques have also helped to contribute to the rise in password cracking. How Your Passwords Are Stored on the Internet (and When Your Password Strength Doesn't Matter) Lettre ouverte à Skype (et donc Microsoft) Depuis 2011, date du fracassant rachat de Skype par Microsoft pour plusieurs milliards de dollars, la situation des données collectées par l’application est encore plus floue que par le passé. Skype makes chats and user data more available to police. The changes to online chats, which are written messages conveyed almost instantaneously between users, result in part from technical upgrades to Skype that were instituted to address outages and other stability issues since Microsoft bought the company last year. Officials of the United States and other countries have long pushed to expand their access to newer forms of communications to resolve an issue that the FBI calls the “going dark” problem.
Microsoft has approached the issue with “tremendous sensitivity and a canny awareness of what the issues would be,” said an industry official familiar with Microsoft’s plans, who like several people interviewed for this story spoke on the condition of anonymity because they weren’t authorized to discuss the issue publicly. The company has “a long track record of working successfully with law enforcement here and internationally,” he added. “The issue is, to what extent are our communications being purpose-built to make surveillance easy?” Tcx Blue cabinet.
From We Re-Build The is a working wiki project to document vendors and manufacturers of surveillance equipment that are used in dictatorships and democracies around the internets. Hacker vaillant rien d'impossible. Silent Circle brouille l’écoute. JonDoFox. Comment protéger votre smartphone de l'espionnage et du gouvernement. iOS: un vol massif de données ?
TOR project uncovers flaw in mass-surveillance appliance. Comment chiffrer ses SMS et MMS. Existe-t-il des codes inviolables ? La clef du RSA.