No. You are not delusional, all those devices are spying on you. You’re down the pub talking about some crazy…
In blog entry publicly distributed couple of days ago, Facebook uncovered that its security team discovered the attack that happened…
Chapter 1 - Android - Debugging and Analyzing Vulnerabilities It’s very difficult—arguably impossible—to create programs that are free of bugs.…
Digital Forensics - An art form lacking broad scientific standards Forensics is changing in the digital age, and the legal…
Finding Extremists Online New research has found a way to identify extremists, such as those associated with the terrorist group…
Park Jin Hyok, North Korean hacker, who has officially been charged by the US Department of Justice for carrying out the WannaCry attacks, among other…
Facebook is fighting back against a NY Times article that the social media giant empowered phone-makers to have access to…
A side-channel vulnerability in Google Chrome and Mozilla Firefox permits drive-by de-anonymization of Facebook clients. An exploit would allow an…
Sign in to your account