Secret ‘BADASS’ Intelligence Program Spied on Smartphones – The Intercept
https://firstlook.org/theintercept/2015/01/26/secret-badass-spy-program/ Posted from WordPress for Android →
https://firstlook.org/theintercept/2015/01/26/secret-badass-spy-program/ Posted from WordPress for Android →
What could be considered a reliable design nowadays? It is seems to be that thing are somwwhat different in today’s interconnected world compared to earlier times. Reliability Definition Is Changing article at Semiconductor Engineering magazine is a good introduction on what is changing in embedded systems design. The complexity and vulnerabilities in systems are raising →
https://www.schneier.com/blog/archives/2015/02/understanding_n.html Posted from WordPress for Android →
http://www.iflscience.com/physics/quantum-physics-can-fight-fraud-making-card-verification-unspoofable Posted from WordPress for Android →
http://www.iflscience.com/technology/it-s-not-just-your-tv-listening-your-conversation Stop talkig too loudly – Internet can hear what you say. You might not be too paranoid if you are worried that your new TV and smartphone can listen every word you say so that they can send information on it to Internet – because they can do that in many cases. Posted from →
https://juliareda.eu/2014/12/1-million-for-open-source-security/ Posted from WordPress for Android →
http://www.itworld.com/article/2881775/four-technologies-that-betrayed-silk-roads-anonymity.html Posted from WordPress for Android →
http://m.heise.de/ct/artikel/Beemer-Open-Thyself-Security-vulnerabilities-in-BMW-s-ConnectedDrive-2540957.html?from-classic=1 Posted from WordPress for Android →
http://www.catb.org/jargon/html/meaning-of-hack.html Posted from WordPress for Android →
https://ssd.eff.org/en/playlist/activist-or-protester#introduction-threat-modeling Introduction to threat modeling… A necessary step to do to know what to do. Posted from WordPress for Android →