Spying

Researchers train drones to use Wi-Fi to look through walls | TechCrunch

https://techcrunch.com/2017/06/19/researchers-train-drones-to-use-wi-fi-to-look-through-walls/?ncid=rss&utm_source=tcfbpage&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&utm_content=FaceBook&sr_share=facebook This is quite interesting -or frightening – WiFi radar application. A new system by University of California, Santa Barbara researchers Yasamin Mostofi and Chitra R. Karanam uses two drones, a massive Wi-Fi antenna, and a little interpolation to literally see through solid walls. One drone blasts Wi-Fi through the structure and another picks up the signal.

Who catches the IMSI catchers? Researchers demonstrate Stingray detection kit

https://techcrunch.com/2017/06/02/who-catches-the-imsi-catchers-researchers-demonstrate-stingray-detection-kit/?ncid=rss&utm_source=tcfbpage&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&utm_content=FaceBook&sr_share=facebook What’s needed is an independent method of identifying IMSI catchers in the wild. That’s what University of Washington researchers Peter Ney and Ian Smith have attempted to create with SeaGlass. “Up until now the use of IMSI-catchers around the world has been shrouded in mystery, and this lack of concrete information is a barrier to

Vault7 by WikiLeaks

https://wikileaks.org/ciav7p1/ Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7″ by WikiLeaks project claims that recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation.

Browser Fingerprinting Tech Works Across Different Browsers for the First Time – IEEE Spectrum

http://spectrum.ieee.org/tech-talk/telecom/internet/new-online-fingerprinting-technique-works-across-browsers Browsing the web just got a little less anonymous. The software that lets web sites identify you by certain characteristics of your computer and software was usually thwarted if you switched browsers. But now computer scientists have developed new browser fingerprinting software that identifies users across web browsers

Bad idea: GPS tracking of cars

Recently, the media has been on discussion on making the country roads to be controlled by private company and Finnish cars envisaged the so-called mandatory. black box. On this discussion it has been several times mentioned that the Finnish Government has planned a mandatory monitoring devices for all cars to collect “road tax” based on

How to hack a security CCTV camera (video) » TechWorm

How to hack a security CCTV camera (video) article at http://www.techworm.net/2016/10/hack-security-cctv-camera-video.html talks on issue on IoT device hacking. This video shows how bad IoT CCTV camera security really is. It also tells about Android security. Security cameras are a fine value addition to the security apparatus because they offer irrefutable proof of people in the