Security

Location data collecting smart-phones

A location-based services (LBS) are a hot topic among mobile services developers. A location-based service (LBS) is an information or entertainment service, accessible with mobile devices through the mobile network and utilizing the ability to make use of the geographical position of the mobile device. Modern smart-phones have abilities to locate the position of the

Mag-stripe readers

iPhone mag-stripe reader stalled article tells that Square, the expected to be breakthrough business launched by twitter-founder Jack Dorsey, won’t be shipping as scheduled. Interesting is that Square was just a magnetic-stripe reader, and that there were a dozen credit card-processing applications on the iPhone. Only this time, it comes with a plastic lump that

Car electronics security

Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular networks. Experimental Security Analysis of a Modern Automobile report experimentally evaluates these issues on a modern automobile and demonstrate the fragility of the underlying system structure. The paper demonstrates that an attacker

How trackable is your browser?

Is your browser configuration rare or unique? If so, web sites may be able to track you, even if you limit or disable cookies. Panopticlick service tests your browser to see how unique it is based on the information it will share with sites it visits. The service will show the information your web browser

Most Dangerous Programming Errors

The 2010 CWE/SANS Top 25 Most Dangerous Programming Errors is a list of the most widespread and critical programming errors that can lead to serious software vulnerabilities. They are often easy to find, and easy to exploit. They are dangerous because they will frequently allow attackers to completely take over the software, steal data, or

Do not use Internet Explorer

The German and French governments have warned web users to find an alternative browser to Internet Explorer to protect security. Microsoft has admitted that IE was the weak link in recent attacks on Google’s systems. That Operation Aurora attack used Chinese malware. This broad attack exploits a new, not publicly known vulnerability in Microsoft Internet