• Weekly Privacy Roundup #15

    “We will have more Internet, larger numbers of users, more mobile access, more speed, more things online and more appliances we can control over the Internet.” - Vinton Cerf Primary Indian ticket vendor suffers crippling data breach One of India’s… read more »
  • Routopsy: hacking Routing with Routers

    A really interesting talk by Szymon Ziolkowski and Tyron Kemp by SensePost, presented at BlackHat USA 2020. During their engagements, researchers found various networks vulnerable to insecure, misconfigured, and often overlooked networking protocols, including dynamic routing protocols (referred to as DRP‘s) and… read more »
  • Pen Test Partners: Boeing 747 walk through, from a hacker’s perspective

    The Boeing 747 is one of the best known and most popular airliners of all time. Designed in the 1960s and entered service in 1970, it was the largest airliner in the world in terms of passenger capacity for 37… read more »
  • SANS Institute: how to turn a data breach into an educational opportunity

    The SANS Institute is one of the largest organizations that offer information security training and security certification to users worldwide.In a notification posted recently on their site, the organization states that a phishing attack that target an employee allowed a threat actor to… read more »
  • Goodbye Master Bream. Thank you for everything you did

    “I devoted my life to music for a reason, and the reason wasn’t because I wanted to get on or make money, but to try to fulfil myself and also to give people pleasure” - Julian Bream (15 July 1933… read more »
  • Re­VoL­TE: decrypting LTE calls to eavesdrop on conversations

    A team of academics from the Ruhr University in Bochum, Germany, has discovered that not all mobile operators follow the 4G standard to the letter of the law: they supports encrypted voice calls, but many calls are encrypted with the… read more »
  • Bypassing Biometric Scanners with 3D Printed Fingerprints

    At the DEFCON virtual security conference, security researcher Yamila Levalle outlined how she was able to bypass biometric authentication for a number of different types of fingerprint scanners. During her session [1], Levalle explained various methods of bypass including using a budget… read more »
  • “Coronal Mass Ejection”, my new EP, is out now

    From Wikipedia: ”A coronal mass ejection (CME) is a significant release of plasma and accompanying magnetic field from the solar corona. They often follow solar flares and are normally present during a solar prominence eruption. The plasma is released into the solar wind, and can be observed in coronagraph imagery.“ In my… read more »