Tag: security

Mar 24

DNS leak test

What is a DNS leak and why should I care?

When using an anonymity or privacy service, it is extremely important that all traffic originating from your computer is routed through the anonymity network. If any traffic leaks outside of the secure connection to the network, any adversary monitoring your traffic will be able to log your activity.

DNS or the domain name system is used to translate domain names such as www.privacyinternational.org into numerical IP addresses e.g. 123.123.123.123 which are required to route packets of data on the Internet. Whenever your computer needs to contact a server on the Internet, such as when you enter a URL into your browser, your computer contacts a DNS server and requests the IP address. Most Internet service providers assign their customers a DNS server which they control and use for logging and recording your Internet activities.

Under certain conditions, even when connected to the anonymity network, the operating system will continue to use its default DNS servers instead of the anonymous DNS servers assigned to your computer by the anonymity network. DNS leaks are a major privacy threat since the anonymity network may be providing a false sense of security while private data is leaking.

via DNS leak test.

Mar 20

User-Focused Security: End-to-End Encryption… | Yahoo

User-Focused Security: End-to-End Encryption… | Yahoo.

Mar 20

cSploit/android · GitHub

cSploit – The most complete and advanced IT security professional toolkit on Android.

cSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assesments on a mobile device.

Once cSploit is started, you will be able to easily map your network, fingerprint alive hosts operating systems and running services, search for known vulnerabilities, crack logon procedures of many tcp protocols, perform man in the middle attacks such as password sniffing ( with common protocols dissection ), real time traffic manipulation, etc, etc .

This application is still in beta stage, a stable release will be available as soon as possible, but expect some crash or strange behaviour until then, in any case, feel free to submit an issue here on GitHub.

via cSploit/android · GitHub.

Mar 20

A Finnish man created this simple email account – and received Microsoft’s security certificate – Tivi

A Finnish man created this simple email account – and received Microsoft's security certificate – Tivi.

Mar 12

Android Security Wiki

Android Security Wiki.

Mar 10

Security Tip (ST04-014) Avoiding Social Engineering and Phishing Attacks | US-CERT

Avoiding Social Engineering and Phishing Attacks | US-CERT.

Mar 01

Simple IT Security Tactics for Small Businesses (Video) – Slashdot

Simple IT Security Tactics for Small Businesses (Video) – Slashdot.

Mar 01

Schneier on Security: Everyone Wants You To Have Security, But Not from Them

Schneier on Security: Everyone Wants You To Have Security, But Not from Them.

Feb 22

Onion.city – a search engine bringing the Dark Web into the light | Naked Security

Onion.city – a search engine bringing the Dark Web into the light | Naked Security.

Feb 08

ERCIM White Paper: Cyber-Security and Privacy

ERCIM White Paper: Cyber-Security and Privacy.