Month: September 2018
-
Unbiased algorithms can still be problematic
Creating unbiased, accurate algorithms isn’t impossible — it’s just time consuming. “It actually is mathematically possible,” …
-
Week in review: First-ever UEFI rootkit, Apple DEP vulnerability, new tactics subvert traditional security measures
Here’s an overview of some of last week’s most interesting news and articles: What do you mean by storage …
-
Telegram Leaks Public & Private IP Address While Making Calls
Telegram Desktop version leaking users private and public IP address by default while initiating phone calls from tdesktop and telegram …
-
Implementing Privacy by Design in Hyperledger Indy
Centralized identity providers, such as social media sites and consumer email services, provide convenience to users by offering the …
-
USBStealer – Password Hacking Tool For Windows Machine Applications to Perform Windows Penetration Testing
USBStealer is a Windows Based Password Stealing Tool that helps to Extract the password from Windows Based Applications such as Chrome …
-
Guide to Passay
1. Introduction Nowadays, most web applications have their password policy – which is, simply put, created to force users to create …
-
Beware !! USB Devices & Removable Media are Used to Inject Cryptocurrency Mining Malware
Cybercriminals are still using USB Devices & Removable Media to perform various malicious activities and spreading Cryptocurrency Mining …
-
How Can Smart Contracts in Blockchain Redefine Value Exchange
Blockchain development has become more than just a buzzword. It’s gradually transforming into what many call “the new …
-
Web inventor Berners-Lee creates a new privacy first way of dealing with the internet
We live our lives on the internet. That’s because when Sir Tim Berners-Lee invented the web, he made it easy for everyone to use it and …
●●●