At my current work, I am working with Android devices to detect overlays. The reason for this research are current attacks that abuse the Android…
A blog about IT, security and whatever crosses my mind.
At my current work, I am working with Android devices to detect overlays. The reason for this research are current attacks that abuse the Android…
With the uprise of smart phones in general, and more specific Android phones, we as users give our most personal data to private companies like…
With the uprise of smart phones in general, and more specific Android phones, we as users give our most personal data to private companies like…
With the uprise of smart phones in general, and more specific Android phones, we as users give our most personal data to private companies like…
Given the recent debates about secure and encrypted communication, it might be interesting to understand why most mobile messenger apps do not exactly allow anonymous communication and what possibilities exist to enable it.
I do not read books very often and when I do, I tend to do it in a day or two. In 2016 I read…
This week I learned about Unix file permissions and realized that I did not know anything about it. But apparently, it is not that difficult…
Last week I had to write an [tooltip tip=”Network Time Protocol”]NTP[/tooltip] spoofer for a hacking course. The main goal was to manipulate [tooltip tip=”Network Time…
In the last few weeks, I had to analyze Linux images as part of a computer forensics course. For the course, a participant got a…
Lately I have read about a shocking vulnerability, which resides in every browser due to a design flaw. The vulnerability exposes you to an attack…