Legit APPS or PUA? Keep your eyes wide open!

Nowadays, our Personal Computers are able to perform a huge amount of tasks as we can find Applications for mostly everything one can imagine. Not to mention, we often have more than one App installed for the same kind of task. When does it become too much?

Seamless pattern with social media and technology icons
Probably most of you (me included), after buying a brand new and shiny computer, can’t wait to install all the…
Read More

Putting the S into HTTPS

Without encryption you could not do online shopping, online banking or even downloads and updates over the internet without running an extreme risk.

Close-up view on white conceptual keyboard - https (blue key)
Did you know that you are already using encryption in your browser without noticing it? The small lock icon in…
Read More

United Airlines Breached

You sure remember the big data breach that targeted the U.S. Office of Personnel Management, right? Well, the same group apparently attacked United Airlines.

united_airlines
The attack didn’t just happen yesterday though, but around the same time the US government was broken into. According to…
Read More

MD5: The broken algorithm

When you have to work with thousands of files per day, it is generally a good idea to generate a hash of a file that would identify it on a unique way. A hash function is any function that can be used to map digital data of arbitrary size to digital data of fixed size.

MD5 Broken Algorithm
There are many hashing algorithms to choose from. Here are the main factors to take into consideration when deciding which one…
Read More

Hacked Car Is Driven Into Ditch

You’ve heard it a thousand times: A car can be hacked. But of course you don’t take this warning seriously. Why should you, right? I know for sure that I don’t, most of the time. Especially since my car is kind of old. The most recent news gave me pause though – and might make yourself more security aware as well when it comes to your car.

IMG_0724-1024x768
Why? Because cars are now definitely hackable. It has been proven. By driving a Chrysler Jeep Cherokee in a ditch.…
Read More
1 2 3 23