Hacking and hackers are shrouded in many myths, perhaps most notably by film production and journalists who need to engage their readers and viewers. But very little of what we see in the media corresponds to reality.
Category:video
Videosérie Digitální Sebeobrany
Série videí o soukromí a bezpečnosti v digitálním prostoru.
Be careful with Chrome on your Android phone
New type of attack uses the features of Chrome on Android phones, which hide the address bar when the user scrolls the page down. The address will reappear when you scroll the page up. An attacker can exploit this feature and force the browser to hide the original address bar and instead display its own, …
Continue reading Be careful with Chrome on your Android phone
Unhackable car alarm
According to their creators, Troy was impregnable, Titanic was unsinkable, and Pandora’s car alarm was unhackable. However, someone (or something) appears to be brave enough to accomplish the impossible. The Pandora and Viper products were tested by Pen Test Partners and found that with these alarms the car is even more vulnerable than without them. …
Continue reading Unhackable car alarm
Message encryption – demo
Plain (email) Client to Server (Facebook Messenger, Gmail) End to end (Signal, Threema, Wire) You Hello there! Send Key: Transfer to server (internet): Hacker Server: AdminPolice Transfer to receiver (internet): Hacker Receiver: Key:
Data breach check
You can check if your login credentials (and other data) were breached. Submit your username or email address you are using for registrations. Do not submit your password (here or anywhere else)! You need to have javascript enabled. In case the form is not working you can visit the site directly: https://haveibeenpwned.com/ What to do …
Continue reading Data breach check