Cybersecurity

US intelligence chief: we might use the internet of things to spy on you | Technology | The Guardian

The US intelligence chief has acknowledged for the first time that agencies might use a new generation of smart household devices to increase their surveillance capabilities. As increasing numbers of devices connect to the internet and to one another, the so-called internet of things promises consumers increased convenience – the remotely operated thermostat from Google-owned

The Secrecy Cryptography Giveth to Criminals, the Internet of Things Taketh Away – IEEE Spectrum

In the rock-paper-scissors game of technology, the Internet of Things beats cryptography. This is the conclusion of a new Harvard Law School report focusing on the FBI’s claims that increasing levels of cryptography in consumer devices means that law enforcement loses. The report retorts that even if cryptography closes some doors, new Internet-connected devices and

Finnish startup Zyptonite brings privacy to video calls

“Zyptonite is the first real-time communications app that connects parties directly,” says Antti Uusiheimala, Co-Founder and CEO of Zyptonite. “People need a simple, reliable and free video call and messenger service that works on different devices and operating systems without problems.” The startup cut out the server and built its service on peer-to-peer (P2P) technology,

How Do I Drop or Block Attackers IP Address With Null Routes On a Linux?

Someone might attack your Linux based system. You can drop attacker IP using IPtables. However, you can use the route or ip command to null route unwanted traffic. A null route (also called as blackhole route) is a network route or kernel routing table entry that goes nowhere. http://www.cyberciti.biz/tips/how-do-i-drop-or-block-attackers-ip-with-null-routes.html Posted from WordPress for Android

Internet of Exploits (IoE)

I recommend that we start using new term I heard at Disobey.fi event: Internet of Exploits (IoE) is to be used to describe the current and future situation of network being filled exploitable Internet of Things (IoT) and other poorly secured networked devices. We were sold the idea of Internet of Everything (IoE) and what