HackDig : Dig high-quality web security articles for hacker

Don’t have a canary: Why Silent Circle dropped its warrant warning page

News reports that Silent Circle, the commercial encrypted voice-over-IP service company that manufactures the security-focused Blackphone, had removed its "warrant canary" webpage have apparently created some confusion. Things only got fuzzier since the company counsel stated that the page’s removal was a “business decision” and not the result of a warrant b
Publish At:2016-07-07 00:40 | Read:3674 | Comments:0 | Tags:Risk Assessment Technology Lab blackphone Silent Circle warr

Silent Circle promptly patched a critical flaw in the Blackphone I

Silent Circle released an update for its Blackphone 1 that fixes a critical flaw in the modem. Silent Circle has released an update for its Blackphone device that fixes several security vulnerabilities, including a flaw in its modem (CVE-2015-6841) that could have been exploited by threat actors to gain full control of the mob
Publish At:2016-01-07 16:10 | Read:2537 | Comments:0 | Tags:Breaking News Digital ID Mobile Security Blackphone CVE-2015

Paranoid Android redux: “going dark” with Silent Circle’s Blackphone 2

Specs at a glance: Silent Circle Blackphone 2Screen2560×1440 5.5” Full HD IPSOSSilent OS (based on Android Lollipop)CPUQualcomm® Snapdragon 615, 1.7GHz Octa-coreRAM3GBGPUAdreno 405Storage32GB, with up to 128GB additional via microSDNetworkingDual-band 2.4/5.0GHz 802.11 a/b/g/n/ac, Bluetooth 4.0LE. LTE and worldwide 3G/HSPA+ cellular data.PortsMicro USB 2.0,
Publish At:2015-09-29 05:15 | Read:2973 | Comments:0 | Tags:Features Gear & Gadgets Risk Assessment android for work bla

Android Stagefright Flaws Put 950 Million Devices at Risk

Vulnerabilities discovered in the Stagefright media playback engine that is native to Android devices could be the mobile world’s equivalent to Heartbleed. Almost all Android devices contain the security and implementation issues in question; unpatched devices are at risk to straightforward attacks against specific users that put their privacy, data an
Publish At:2015-07-28 09:05 | Read:1997 | Comments:0 | Tags:Google Hacks Mobile Security Vulnerabilities Android Android

Memory Corruption Bug Patched in Blackphone Silent Text App

Blackphone and Silent Circle have patched a serious vulnerability in Silent Text, the messaging application bundled with the smartphone that’s marketed as secure and surveillance resistant.Mark Dowd, a prominent security researcher and founder of Azimuth Security, on Tuesday disclosed details of the vulnerability, which he said could allow an attacker
Publish At:2015-01-29 20:06 | Read:2589 | Comments:0 | Tags:Mobile Security Vulnerabilities Azimuth Security Blackphone

Disconnect’s new app pulls the plug on supercookies, other tracking

Disconnect, the public benefit corporation behind the eponymous online privacy tool and “malvertising” blocking service, released a new version of its virtual private networking and privacy protection service for iOS, Android, Windows, and Mac OS X this morning. Disconnect has offered versions of its service on these platforms in the past, but the latest e
Publish At:2014-11-13 20:30 | Read:2111 | Comments:0 | Tags:Gear & Gadgets Risk Assessment blackphone disconnect malvert

ITsecurity Daily Briefing: 08/18/2014

ITsecurity Daily Briefing: 08/18/2014 The ITsecurity daily security briefing: Thursday August 18, 2014.NewsPapers/ReportsWebThingsEventsM&AAlertsNewsHillary Clinton’s phone ‘hacked by German intelligence’“Hillary Clinton’s phone was hacked during her t
Publish At:2014-08-19 04:10 | Read:8537 | Comments:0 | Tags:News account takeover Bitcoin Blackphone Browlock BSOD Clint

Is the Blackphone really so easy to root? Probably no.

A security researcher claimed to have rooted the super secure Smartphone Blackphone in just five minutes. Is it true? What’s happened? Recently we read about the Blackphone, a super secure smartphone designed by SGP Technologies, a joint venture between Silent Circle and Spanish Geekphone, which is able to avoid survei
Publish At:2014-08-12 17:30 | Read:2405 | Comments:0 | Tags:Hacking Blackphone mobile NSA surveillance

Fog Lifts on Rooted Blackphone Merry-Go-Round

If ever there was a hacking story screaming for clarity, it’s the Blackphone saga that unfolded during DEF CON.First off, yes, the device was rooted by a researcher who goes by the handle Justin Case (@TeamandIRC on Twitter)—but not in five minutes as has been previously reported. Yes, it requires that an extraordinary set of circumstances be in place to get
Publish At:2014-08-12 16:10 | Read:2367 | Comments:0 | Tags:Mobile Security Privacy Vulnerabilities Blackphone Blackphon

Black Hat and DEF CON Wrap Up

Dennis Fisher and Mike Mimoso look back on the news from the last week in Las Vegas at Black Hat and DEF CON, including the Blackphone rooting, the Computrace research and the more upbeat mood at the conferences this year.http://threatpost.com/files/2014/08/digital_underground_162.mp3Download: digital_underground_162.mp3Music by Chris GonsalvesImage via Blac
Publish At:2014-08-12 16:10 | Read:2644 | Comments:0 | Tags:Hacks Podcasts Vulnerabilities Black Hat Black Hat 2014 Blac

NSA-Proof "Blackphone" Gets Rooted Within 5 Minutes

The ultra secure NSA-Proof Blackphone titled as, “world’s first Smartphone which places privacy and control directly in the hands of its users,” has been rooted within 5 minutes at the BlackHat security conference in Las Vegas this weekend. Blackphone, a joint venture between encrypted communications firm Silent Circle and Spanish Smartphone maker Gee
Publish At:2014-08-11 17:30 | Read:1826 | Comments:0 | Tags:Android android apps application development BLACKPHONE hack

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud