Author Archive

Permissionless data slurping: Why Google’s latest bombshell matters • The Register

https://www.theregister.co.uk/2017/11/22/permissionless_data_slurping_google/ Somebody else than just your mobile operator gets to know where you are: According to an old Chinese proverb: “When a wise man points at the Moon, an idiot looks at his finger.” Google may have been hoping that you were examining a finger, not reading a Quartz story yesterday, which reveals how Android phones send

Solid state relay videos

A solid-state relay (SSR) is an electronic switching device that switches on or off when a small external voltage is applied across its control terminals. Packaged solid-state relays use power semiconductor devices such as thyristors and transistors. Here are some SSR videos worth to watch: What is a Solid State Relay? https://www.youtube.com/watch?v=wbQiRM9p0j0 Solid State Relay

OWASP TOP 10 – 2017 Released After Four years

https://gbhackers.com/owasp-top-10-2017-released/ Open Web Application Security Project(OWASP) released new Top 10 Most Critical Web Application Security Risks list. With the new release, they have completely refactored the methodology of categorizing risks.

No, you’re not being paranoid. Sites really are watching your every move | Ars Technica

https://arstechnica.com/tech-policy/2017/11/an-alarming-number-of-sites-employ-privacy-invading-session-replay-scripts/ If you have the uncomfortable sense someone is looking over your shoulder as you surf the Web, you’re not being paranoid. A new study finds hundreds of sites—including microsoft.com, adobe.com, and godaddy.com—employ scripts that record visitors’ keystrokes, mouse movements, and scrolling behavior in real time…

10 of the most-funded startups to fail in 2017 | TechCrunch

https://techcrunch.com/gallery/10-of-the-most-funded-startups-to-fail-in-2017/ Some startups rise and many startups fall when things do not go as planned. 2017 has seen some prominent startups go under. Together these 10 companies raised a combined $1.7 billion from venture capitalists and banks.

Magnetising the next generation of high-throughput satellites | EDN

https://www.edn.com/electronics-blogs/out-of-this-world-design/4459036/Magnetising-the-next-generation-of-high-throughput-satellites?utm_content=bufferddeae&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer This article tells how magnetic electronics components are used in satellite electronics.

Getting Started with IoT Security with Threat Modeling

https://www.denimgroup.com/resources/blog/2017/11/getting-started-with-iot-security-with-threat-modeling/?lipi=urn%3Ali%3Apage%3Ad_flagship3_pulse_read%3BtGhVz%2BNYQRiSgJC%2Bt%2FEWQQ%3D%3D The security of IoT systems can be exceptionally complex because of the large number of components, potentially extensive attack surface, and the interactions between different parts of the system. Threat modeling is a great starting point to understand the risks associated with IoT systems. The challenge with this trend is that IoT devices are just computers