Mobile apps and stealing a connected car
The concept of a connected car, or a car equipped with Internet access, has been gaining popularity for the last several years. The case in point is not only multimediaRead More →
The concept of a connected car, or a car equipped with Internet access, has been gaining popularity for the last several years. The case in point is not only multimediaRead More →
Plus a new, stealthy “anonymous” stick, because that’s what the world really needed. Remember the USB Killer stick that indiscriminately and immediately fries about 95 percent of devices? Well, nowRead More →
Researchers from Boston University, North Carolina State University, and George Mason University have created a new protocol called TumbleBit that they say can anonymize Bitcoin transactions better than any otherRead More →
As I said on my previous article, being a penetration tester makes us feel like a group of traveler. Today, I would like to share a details about yet anotherRead More →
At Context we’re always on the lookout for interesting devices to play with. Sat in a meeting room one day, we noticed that the menus on the conference phone, aRead More →
Islamic State supporters are being targeted with a modified version of the Telegram Android app that contains a version of the OmniRAT remote access toolkit. The app, named plus_gram.apk, isRead More →
The organization is requesting permission to limit disclosures to only the most severe bugs. The Xen Project has requested feedback from the community in thrashing out new disclosure guidelines whichRead More →
JavaScript Web Service Proxies are an alternative to WSDL (Web Services Description Language) files for interacting with WCF Web Services. The proxy files function as a description of the webRead More →
There’s a disturbing possibility that the Mexican government, the soda industry, or some combination of both used spyware to harass health advocates who support Mexico’s soft-drink tax. According to aRead More →
Dutch malware experts have found a new malware strain that targets online shops running on the Magento platform, which can self-heal using code hidden in the website’s database. While thisRead More →