Quantum Physics Can Fight Fraud By Making Card Verification Unspoofable | IFLScience
http://www.iflscience.com/physics/quantum-physics-can-fight-fraud-making-card-verification-unspoofable Posted from WordPress for Android →
http://www.iflscience.com/physics/quantum-physics-can-fight-fraud-making-card-verification-unspoofable Posted from WordPress for Android →
http://www.iflscience.com/technology/it-s-not-just-your-tv-listening-your-conversation Stop talkig too loudly – Internet can hear what you say. You might not be too paranoid if you are worried that your new TV and smartphone can listen every word you say so that they can send information on it to Internet – because they can do that in many cases. Posted from →
https://juliareda.eu/2014/12/1-million-for-open-source-security/ Posted from WordPress for Android →
http://www.itworld.com/article/2881775/four-technologies-that-betrayed-silk-roads-anonymity.html Posted from WordPress for Android →
http://m.heise.de/ct/artikel/Beemer-Open-Thyself-Security-vulnerabilities-in-BMW-s-ConnectedDrive-2540957.html?from-classic=1 Posted from WordPress for Android →
http://www.catb.org/jargon/html/meaning-of-hack.html Posted from WordPress for Android →
https://ssd.eff.org/en/playlist/activist-or-protester#introduction-threat-modeling Introduction to threat modeling… A necessary step to do to know what to do. Posted from WordPress for Android →
http://www.usatoday.com/story/tech/2015/02/04/health-care-anthem-hacked/22900925/ It was expected that hackers turn to hack for health company data in 2015. It seems that it already started in large scale with this incident. Posted from WordPress for Android →
http://www.latesthackingnews.com/2014/10/16/top-android-apps-hacking/ Interesting app list… Posted from WordPress for Android →
As I expected the flow of security bugs continues this year. Now first serious open source bug disclosed this year following last year’s Heartbleed bug in OpenSSL, the Shellshock bug in Bash and the POODLE bug related to the the SSL v3 fall back issue. The GHOST vulnerability is a serious weakness in the Linux →