Home Tags Fingerprinting

Tag: Fingerprinting

Judge: No, feds can’t nab all Apple devices and try everyone’s...

Enlarge (credit: GLENN CHAPMAN/AFP/Getty Images) A federal magistrate judge in Chicago recently denied the government’s attempt to force people in a particular building to...

Intermediate CA Caching Could Be Used to Fingerprint Firefox Users

The way Firefox caches intermediate CA certificates could allow for the fingerprinting of users and the leakage of browsing details, a researcher warns.

Now sites can fingerprint you online even when you use multiple...

Enlarge / System architecture of a cross-browser tracking system. (credit: Cao et al.) Researchers have recently developed the first reliable technique for websites...

8 Docker security rules to live by

Odds are, software (or virtual) containers are in use right now somewhere within your organization, probably by isolated developers or development teams to rapidly...

FTC sets $25,000 prize for automatic IoT patching

The U.S.Federal Trade Commission is scheduled to announce Wednesday a “prize competition” for a tool that can used against security vulnerabilities in internet of...

Alpha Version of Sandboxed Tor Browser Released

A sandboxed version of the Tor Browser was released over the weekend, and while there are still some rough edges and bugs – potentially major,...

Kaspersky Security Bulletin. Predictions for 2017

 Download the PDF Yet another year has flown past and, as far as notable infosec happenings are concerned, this is one for the history books.Drama,...

How Clinton could have avoided the Wikileaks fiasco

People who are upset that Hillary Clinton’s personal email server may have been hacked are missing the big picture. Nearly everything that is worth...

TrapX Using Deception to Fight Back Against SWIFT Attacks

As hackers take aim at financial services, there is an increasing need to find new ways to deflect attacks. The Society for Worldwide Interbank Financial...

Leaky IoT devices help hackers attack e-commerce sites

Millions of IoT devices are misconfigured so that they can forward messages -- which, combined with default admin settings, allows them to be used...

Domain name resolution is a Tor attack vector, but don’t worry

Nation-state attackers probably pwn you anyhow This one needs the words “Don't Panic” in large friendly letters on the cover: privacy researchers have worked out...

Attivo Networks Self-Learning Dynamic Security Debuts

Attivo Camouflage uses its home-developed Dynamic Behavioral Deception to generate lures and decoys that are identical to real assets. Attivo Networks specializes at messing up...