Bits, Please!: Extracting Qualcomm’s KeyMaster Keys – Breaking Android Full Disk Encryption
http://bits-please.blogspot.fi/2016/06/extracting-qualcomms-keymaster-keys.html?m=1 You data is not safe anymore in encrypted file system! →
http://bits-please.blogspot.fi/2016/06/extracting-qualcomms-keymaster-keys.html?m=1 You data is not safe anymore in encrypted file system! →
http://mobile.eweek.com/security/home-computers-connected-to-the-internet-arent-private-court-rules.html What? →
http://spectrum.ieee.org/computing/software/automated-to-death This article is an investigation to automation paradox. Automation is usually reliable, but when it fails due error or in unexpected situation, the results can disasterous. →
http://www.iflscience.com/technology/how-risky-are-the-worlds-economic-forums-top-ten-emerging-technologies-for-2016/ Are we safe or in real danger with the latest technical innovations? →
http://blog.appcanary.com/2016/encrypt-or-compress.html Good security question to think about. →
http://arstechnica.com/security/2016/06/chrome-drm-download-netflix-piracy/ Downloading Netflix videos is possible according to researchers. →
https://heatst.com/uk/exclusive-brexit-2nd-referendum-petition-a-4-chan-prank-bbc-report-it-as-real/ How well can you trust online gallups and petitions after this? What is your trust to mainstream media fact checking now? →
http://www.kamranmohsin.com/hackers-using-google-dorking-tool-mayhem/ Google is used to find vulnerabilities and sensitive information! Article has also some data on security spending by companies. →
https://www.entrepreneur.com/article/277086?utm_campaign=SocialSwap&utm_source=ZDT&utm_medium=Social&utm_content=Articles Make sure you have those data security topics well handled in your business! →
http://www.theatlantic.com/magazine/archive/2016/07/your-coffeemaker-is-watching-you/485597/?utm_source=atlfb In future house full of IoT gadgets you are never alone because technology is constantly watching you – for good and bad. →