The “smart” privacy invasions
A quick foray into the realm of smart devices and the Internet of Things – with some examples of privacy policies from LG and Samsung – the stuff that nobody ever reads.
A quick foray into the realm of smart devices and the Internet of Things – with some examples of privacy policies from LG and Samsung – the stuff that nobody ever reads.
We take a look a the NSA’s recently released document that covers tangible risks posed by the mobile technology, from smartphones and IoT devices to wearable gadgets and privacy breaching apps.
I have talked to a fellow ex-law enforcement officer about the Encrochat takedown – here are some valuable insights.
The emphasis of the VPN importance for digital privacy and how things can go wrong if it’s not being used.
How to identify Bitcoin addresses, wallets, transactions, users and their associations
Even military hackers make OPSEC mistakes. I bring back the APT1 story in order to outline some bad OPSEC examples that you should avoid if conducting online investigations.
Tricky Thursday focuses on keyloggers. Keyloggers come in two types – hardware and software. Essentially, both types are digital surveillance tools that capture and record anything that you type on your computer’s keyboard. Check out my methods of detecting and defending against keyloggers.
A quick glimpse at various types of concealed cameras used for breaching privacy and illegal covert recording. Disturbing as it was, some of these were trending during the recent Black Friday and Cyber Monday sales.
Osint Me interviews Stella, an online safety professional focused on the human aspect of digital privacy. She was a victim of stalking, both in the cyberspace and in real life.
We discuss what kind of user information we give away when visiting websites.