Cybersecurity

The Secrecy Cryptography Giveth to Criminals, the Internet of Things Taketh Away – IEEE Spectrum

In the rock-paper-scissors game of technology, the Internet of Things beats cryptography. This is the conclusion of a new Harvard Law School report focusing on the FBI’s claims that increasing levels of cryptography in consumer devices means that law enforcement loses. The report retorts that even if cryptography closes some doors, new Internet-connected devices and

Finnish startup Zyptonite brings privacy to video calls

“Zyptonite is the first real-time communications app that connects parties directly,” says Antti Uusiheimala, Co-Founder and CEO of Zyptonite. “People need a simple, reliable and free video call and messenger service that works on different devices and operating systems without problems.” The startup cut out the server and built its service on peer-to-peer (P2P) technology,

How Do I Drop or Block Attackers IP Address With Null Routes On a Linux?

Someone might attack your Linux based system. You can drop attacker IP using IPtables. However, you can use the route or ip command to null route unwanted traffic. A null route (also called as blackhole route) is a network route or kernel routing table entry that goes nowhere. http://www.cyberciti.biz/tips/how-do-i-drop-or-block-attackers-ip-with-null-routes.html Posted from WordPress for Android

Internet of Exploits (IoE)

I recommend that we start using new term I heard at Disobey.fi event: Internet of Exploits (IoE) is to be used to describe the current and future situation of network being filled exploitable Internet of Things (IoT) and other poorly secured networked devices. We were sold the idea of Internet of Everything (IoE) and what