HackDig : Dig high-quality web security articles for hacker

Will the new iPhone 11 track you even if you tell it not to?

byPaul DucklinStories about privacy blunders by big companies always attract a lot of attention.When that big company is Apple, you can replace ‘a lot’ with ‘a whole lot’.And Apple likes to make public pitches about the privacy its products provide, like the video here:So, when renowned investigative cybersecurity journalist Brian Kre
Publish At:2019-12-09 12:35 | Read:55 | Comments:0 | Tags:Apple GPS iPhone Location Services Tracking

Cybersecurity for journalists: How to defeat threat actors and defend freedom of the press

When you’re a journalist or work for the press, there may be times when you need to take extra cybersecurity precautions—more so than your Average Joe. Whether a reporter is trying to crowd-source information without revealing their story or operating in a country where freedom of the press is a pipe dream, cybersecurity plays an important role for any journ
Publish At:2019-11-11 23:20 | Read:302 | Comments:0 | Tags:How-tos communication data eavesdropping encrypted journalis

Flaws in MAC address randomization implemented by vendors allow mobile tracking

Researchers devised a new attack method that can be leveraged to track mobile devices that rely on MAC address randomization mechanism. The MAC address is a unique and an hardcoded identifier assigned to a device’s network interface. This characteristic makes it an excellent tool for the tracking of the devices. A group of researchers from the U.S. Naval Aca
Publish At:2017-03-12 23:40 | Read:4965 | Comments:0 | Tags:Uncategorized Android iOS Mac MAC address randomization priv

Uber asks to track your location even when you’re not using the app

The last update for the Uber app raises great concerns because it asks to track users’ location even when they’ve been dropped off and exited the program. The last update of the Uber App allows it to track the passengers’ locations even when they have been dropped off and the application is running in the background of a customer’s smartphone. With th
Publish At:2016-12-05 08:30 | Read:4209 | Comments:0 | Tags:Breaking News Digital ID Mobile Security mobile privacy trac

Email Tracking for Dummies

[The post Email Tracking for Dummies has been first published on /dev/random]   Recently, I was involved in an incident handling mission to find how some confidential emails were being tracked. Let’s imagine a first scenario: Alice sends a mail to Bob. Bob reads Alice’s email and Alice gets notified. Nothing special, this is a standard feature offered b
Publish At:2015-12-08 02:25 | Read:5017 | Comments:0 | Tags:Forensics Incident Management Security Software IH Incident

Just $1400 to build an IMSI catcher like device to track phones

A group of researchers demonstrated that it is possible to build a Low-cost IMSI catcher for 4G/LTE networks to track phone locations. IMSI catcher for 4G/LTE networks are very expensive devices that allow tracking phone locations. Now a group of researchers has found a way to track devices using the latest LTE standard for mo
Publish At:2015-10-29 16:20 | Read:4666 | Comments:0 | Tags:Breaking News Hacking Mobile 2G 3G IMSI catcher LTE mobile O

Fitbit trackers can be infected with a malware in just 10 seconds

A security expert conducted a series of tests on the Fitbit trackers discovering how they can be infected with a malware in just 10 seconds. The security researcher Axelle Apvrille revealed that infect Fitbit trackers with a malware is too easy. Axelle Apvrille has managed to infect FitBit Flex fitness tracker and uses them
Publish At:2015-10-22 22:20 | Read:3221 | Comments:0 | Tags:Breaking News Hacking Bluetooth y Fitbit trackers fitness iB

Ghostery: A Tool that Stops Trackers

For those who feel they are being watched by a “big brother”, there are several tools that will help you in stopping some of the online tracking that is going on. If you are using Firefox I would like to recommend this post about hardening Firefox. One of the options my colleague posted was Ghostery. Ghostery is available on their website for many browsers a
Publish At:2015-09-23 04:50 | Read:4428 | Comments:0 | Tags:Privacy analytics block chrome options Pieter Arntz privacy

Why everyone should use an ad blocker to fight tracking

Why everyone should use an ad blocker to fight tracking Posted by Kevin on July 21, 2015.Earlier this month Alex Hanff did an excellent article on why business should use AdblockPlus on its networks to increase security and decrease bandwidth costs. Both of these arguments equally appl
Publish At:2015-07-21 11:30 | Read:1723 | Comments:0 | Tags:Expert Views Kevin Townsend's opinions targeting Tracking

Marauder’s Map allows Tracking Facebook Friends with a Chrome extension

Marauder’s Map is the name of a Chrome extension developed by Aran Khanna to simply track Facebook users using Facebook Messanger data. A student from Cambridge, Aran Khanna, has developed a Chrome extension that allows tracking Facebook friends on map. The developer named the extension Marauder’s Map as the magical Marauder’
Publish At:2015-05-28 15:50 | Read:3374 | Comments:0 | Tags:Breaking News Hacking Security Social Networks Facebook Mess

Do Not Track: An Interactive Documentary Series

Who are you, what do you do and who is watching you do it? Three simple questions, posed by a new interactive documentary called Do Not Track. If you’re curious to know exactly what information you’re offering up online when you visit websites, then you’ll want to take part in the interactive portions of their upcoming sessions which run fr
Publish At:2015-04-14 19:05 | Read:3628 | Comments:0 | Tags:Privacy adverts data privacy tracking

For real data privacy, transparency and encryption are our best hopes

With Net Neutrality close to becoming a reality in the United States, Europe’s telecom companies appear ready to fight for consumers’ trust. At the Mobile World Congress in Barcelona this week, Telefonica CEO Cesar Alierta called for strict rules that will foster “digital confidence”. Vodafone CEO Vittorio Colao’s keyn
Publish At:2015-03-16 10:25 | Read:3385 | Comments:0 | Tags:Privacy Security authentication data control data privacy en

A Brief History of the Trusted Internet

By Allen Scott, managing director of F-Secure UK and Ireland The internet and the industry which surrounds it is at a tipping point. The scramble to dominate in emerging product and service markets has led many organisations to lose sight of what the Internet should be. If things continue on this downward moral trajectory, we run the risk of breaching the ri
Publish At:2015-03-03 18:21 | Read:2041 | Comments:0 | Tags:Internet of Things Security Internet Internet history IoT pr

The War Against Ad-Blockers

The War Against Ad-Blockers Phys.org are currently running a story titled “Internet giants wage war on pop-up ad blockers” in which they raise moral panic about the woes of the advertising industry being crippled by Ad-Blockers.Depending on the website, the percentage of vi
Publish At:2014-12-08 10:20 | Read:3389 | Comments:0 | Tags:Alexander Hanff Expert Views News_privacy ad-blocker Adverti

How to clear out cookies, Flash cookies and local storage

This quick fix will show you how to clear out cookies and the cookie-like things that can be used to track you online.If you already know what cookies are all about then you can skip the next bit and go straight to the instructions.Why cookies are importantCookies are very small pieces of information given to your web browser by the sites you visit. Your bro
Publish At:2014-11-05 18:10 | Read:4867 | Comments:0 | Tags:Apple Safari Featured Firefox Google Chrome Internet Explore

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud