State-sponsored cyber spies targeting IoT - a warning from Microsoft

State-sponsored cyber spies targeting IoT - a warning from Microsoft

Back in April, Microsoft security researchers observed the infamous Russian-backed hacking group STRONTIUM (also known as Fancy Bear or APT28) compromising popular IoT devices (a VOIP phone, an office printer, and a video decoder) across multiple customer locations.

GitHub - jankais3r/Siri-NoLoggingPLS: Configuration profile disabling server-side logging of Siri requests for your Mac, iPhone and iPad

GitHub - jankais3r/Siri-NoLoggingPLS: Configuration profile disabling server-side logging of Siri requests for your Mac, iPhone and iPad

Configuration profile disabling server-side logging of Siri requests for your Mac, iPhone and iPad. 4 commits 1 branch 0 releases 1 contributor MIT Branch: master. Configuration profile disabling server-side logging of Siri requests for your Mac, iPhone and iPad. Installation steps: Open the.

How To Start and Use Tails Linux Distribution For Privacy, Security and Anonimity?

How To Start and Use Tails Linux Distribution For Privacy, Security and Anonimity?

In this tutorial, we will learn how to boot or start Tails with different configurations and security metrics. Tails OS is mainly provided in two formats named ISO and USB image. We can set the Keyboard Layout of the Tails by click to the.

Why uBlock Origin requests to store unlimited data in Firefox

Why uBlock Origin requests to store unlimited data in Firefox

Why uBlock Origin requests to store unlimited data in Firefox. Firefox users who have the content blocker uBlock Origin installed receive a permission prompt currently when uBlock Origin is updating. Firefox users who have the content blocker uBlock Origin installed receive a permission prompt currently when uBlock Origin is updating.

Security and Privacy

Security and Privacy

Some good ones are: If you’re particularly paranoid, use one that encrypts the passwords locally on your computer, as opposed to storing them in plain-text at the server. If you truly want a VPN, use a provider you’re sure you trust, and you should probably pay for it.

Windows 10 and HIPAA Compliance

Windows 10 and HIPAA Compliance

But during testing and planning deployment, Cortana and the mobile-OS-like features of sending data to third-parties begs the question, “Does Windows 10 violate HIPAA Privacy?” The short answer is that the default configuration of Windows 10 may violate HIPAA.

How to Encrypt Your DNS With DNSCrypt on Ubuntu and Debian

How to Encrypt Your DNS With DNSCrypt on Ubuntu and Debian

$ sudo apt install dnscrypt-proxy Configure Your DNS Server There really isn't much that needs to be done in the way of configuration to get DNSCrypt working.

Technitium Blog

Technitium Blog

However, most operating systems and applications do not support them but, end users can still use these protocols on their computer by installing Technitium DNS Server locally and configuring any DoT or DoH provider as a forwarder to bypass ISP's control over DNS.

Librefox: Firefox with privacy enhancements

Librefox: Firefox with privacy enhancements

The project uses the Ghacks user.js and other information to create a browser that offers better privacy and security out of the box. While privacy configuration files like the Ghacks user.js file can be applied to the browser to achieve the same, the main benefit of running Librefox is that it offers most of that right away.

How to Use a VPN to Improve Security on Your MacOS Device

How to Use a VPN to Improve Security on Your MacOS Device

If your VPN provider doesn’t have a custom app for Mac and you want to use OpenVPN, you’ll need to use the Tunnelblick app. Download and install the Tunnelblick app for Mac. Get the configuration package from your VPN provider and unzip it.

How to Use a VPN to Improve Security on Linux

How to Use a VPN to Improve Security on Linux

If you’re using Linux because of its security offerings, it makes sense to install a VPN on it to help keep it safe from hackers and snoopers. Click on the Plus sign and add a network connection.

How to Use a VPN to Improve Security on Your iOS Device

How to Use a VPN to Improve Security on Your iOS Device

If your VPN provider doesn’t have a custom app, iOS will let you configure the VPN using its inbuilt settings. Now that you’ve installed a VPN on your device, make sure you connect to it whenever you go online to improve your security.

How to clear your cache, cookies and web history in Mozilla Firefox

How to clear your cache, cookies and web history in Mozilla Firefox

Luckily it’s very easy to remove your cache, cookies and web history in Firefox simply by following these steps: However, Firefox can be configured to clear cache, cookies and history on closing through the privacy and security settings.

Secure P2P chat

Secure P2P chat

Here I will show you how to setup encrypted peer-to-peer chat and make your communication private and secure with use of Husarnet, Avahi and Pidgin.

German federal office BSI publishes Telemetry analysis

German federal office BSI publishes Telemetry analysis

The research paper, which is available in English (partially) and German, provides a deep analysis of Telemetry functionality that Microsoft implemented in the company's Windows 10 operating system.

Do you care about your privacy? Maybe it is time to set up your own Dropbox.

Do you care about your privacy? Maybe it is time to set up your own Dropbox.

Personally I am a very huge user of Evernote for note taking available on a lot of my device and of Dropbox to have my files available anywhere and on all my devices.

How to See What Your Router is Exposing to the Internet

How to See What Your Router is Exposing to the Internet

If you don’t get any results, your router likely didn’t show any ports to be open during their most recent scan. But what if the most recent Shodan scan was a while ago and you made a router configuration today that you want audited?

Schneier on Security

Schneier on Security

By applying our framework, which generates a comprehensive set of test cases covering various web mechanisms, we identify several flaws in the policy implementations of the 7 browsers and 46 browser extensions that were evaluated.