Often it the online processes around blockchain and cyrpto-currencies that are exploited by the threat actors, not the blockchain itself – which remains secure. Following a year of research, a report by Trail of Bits, commissioned by the US Government Defense Advanced Research Projects Agency (DARPA) shows that the blockchain …
Google Threat Assessment Group tackles smartphone malware
This is a follow-up to last week’s story: New commercial spyware for phones – Smart Thinking Solutions This is Google describing how they countered the Hermit smartphone malware and discusses their Project Zero for countering zero-day threats. Spyware vendor targets users in Italy and Kazakhstan (blog.google) Your best defence against …
Continue reading “Google Threat Assessment Group tackles smartphone malware”
Mega issues a security update
Following this story, earlier this week, about the privacy focused cloud storage company Mega: If Mega cannot decrypt your files, don’t worry hackers can… – Smart Thinking Solutions There is an update on Bleeping Computers: MEGA fixes critical flaws that allowed the decryption of user data (bleepingcomputer.com) Which is better …
If Mega cannot decrypt your files, don’t worry hackers can…
Mega is a popular cloud storage service – with over 250million users. A minimum requirement for any cloud storage service is that the data at rest in their data centres must be encrypted. It seems that Mega’s is not, even though their own publicity states your data will be safely …
Continue reading “If Mega cannot decrypt your files, don’t worry hackers can…”
CPU vulnerabilities – and it does not matter if you are team Intel, team AMD or team Apple!
There have been two pieces of recent research that are pointing to serious issues with a lot of the silicon we use to power our computers. Some of which may be irreparable. The Apple M1 attack is called PACMAN, as it exploits the Pointer Authentication Code (PAC). This attack bypasses …