WhatsApp and Myth Behind its Encrypted Chats
https://www.hackread.com/whats-app-chat-encryption-myth/ WhatsApp uses end-to-end ancryption for message sending, but the app can leave even the deleted messages accessible. →
https://www.hackread.com/whats-app-chat-encryption-myth/ WhatsApp uses end-to-end ancryption for message sending, but the app can leave even the deleted messages accessible. →
http://www.macworld.com/article/3088057/internet-of-things/what-s-being-done-to-improve-security-for-the-internet-of-things.html →
http://spectrum.ieee.org/telecom/security/protecting-gps-from-spoofers-is-critical-to-the-future-of-navigation?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+IeeeSpectrum+%28IEEE+Spectrum%29&utm_content=FaceBook GPS is very widely used and vulnerable to spoofing. This article gives introduction to GPS and what could be done against spoofing attempts. →
http://www.zdnet.com/article/windows-10-telemetry-secrets/ This article tells what kind of data Windows 10 collects and how. →
https://techcrunch.com/2016/07/25/nist-declares-the-age-of-sms-based-2-factor-authentication-over/ Just when we get used to SMS for extra security for authentication, experts tell that it is not that secure as we would like it to be… →
https://www.wired.com/2016/07/radio-hack-steals-keystrokes-millions-wireless-keyboards/ Many wireless keyboards are not safe. →
http://arstechnica.com/security/2016/07/new-attack-that-cripples-https-crypto-works-on-macs-windows-and-linux/ Web Proxy Autodiscovery can reveal full URLs from HTTPS traffic when you browse on WiFi network. →
https://www.wired.com/2016/07/now-can-hide-smart-home-darknet/ How Tor can help in IoT security challenges? →
https://www.entrepreneur.com/article/253306 →
http://krebsonsecurity.com/2016/07/cybercrime-overtakes-traditional-crime-in-uk/ Cyber crime is huge issue! →