Google has launched a new encryption algorithm that has been built specifically to run on mobile phones and smart IoT devices that don’t have the...
Archive - February 2019
This software project is a result of a Bachelor’s thesis created at SCHUTZWERK in collaboration with Aalen University by Philipp Schmied. Please refer to...
The developers behind the privacy-minded Zcash cryptocurrency have recently discovered and patched a highly dangerous vulnerability in the most secretive way...
For all of the undeniable conveniences the Internet has brought us, it’s becoming an increasingly dangerous place to be. Both individual hackers and...
Using an Android device? Beware! You have to remain more caution while opening an image file on your smartphone—downloaded anywhere from the Internet or...
Synopsis bscan is a command-line utility to perform active information gathering and service enumeration. At its core, bscan asynchronously spawns processes of...
Ever sent a message on Facebook Messenger then immediately regretted it, or an embarrassing text to your boss in the heat of the moment at late night, or maybe...
With so many data breaches happening almost every week, it has become difficult for users to know if their credentials are already in possession of hackers or...
You’ve always been warned not to share remote access to your computer with any untrusted people for many reasons—it’s basic cyber security advice...
It’s 2019, and just opening an innocent looking office document file on your system can still allow hackers to compromise your computer. No, I’m...