Vault7 by WikiLeaks

https://wikileaks.org/ciav7p1/ Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7″ by WikiLeaks project claims that recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation.

Browser Fingerprinting Tech Works Across Different Browsers for the First Time – IEEE Spectrum

http://spectrum.ieee.org/tech-talk/telecom/internet/new-online-fingerprinting-technique-works-across-browsers Browsing the web just got a little less anonymous. The software that lets web sites identify you by certain characteristics of your computer and software was usually thwarted if you switched browsers. But now computer scientists have developed new browser fingerprinting software that identifies users across web browsers

Bad idea: GPS tracking of cars

Recently, the media has been on discussion on making the country roads to be controlled by private company and Finnish cars envisaged the so-called mandatory. black box. On this discussion it has been several times mentioned that the Finnish Government has planned a mandatory monitoring devices for all cars to collect “road tax” based on

How to hack a security CCTV camera (video) » TechWorm

How to hack a security CCTV camera (video) article at http://www.techworm.net/2016/10/hack-security-cctv-camera-video.html talks on issue on IoT device hacking. This video shows how bad IoT CCTV camera security really is. It also tells about Android security. Security cameras are a fine value addition to the security apparatus because they offer irrefutable proof of people in the