Your 35-Character Password is Weak

2019-06-03T14:50:59-06:00June 3rd, 2019|Tags: , , |

According to Frank Gifford this 35-character password, FI7CTQsBDvsMwbQNyY6qxV2FunWIUpXpcZm, is surprisingly weak. Java’s util.Random class uses a pseudo-random number generator (PRNG) which creates a deterministic sequence of numbers. When one needs statistically random numbers, such as for Monte Carlo simulations, this is a [...]

Hackers Can Exploit This Bug to Tamper with Surveillance Camera Footage

2018-11-29T16:00:28-07:00December 3rd, 2018|Tags: , , |

There is a vulnerability in Nuuo surveillance cameras which hackers can use to hijack the devices to tamper with footage and live feeds. The Cybersecurity firm Digital Defense said that its Vulnerability Research Team (VRT) had uncovered a zero-day vulnerability in Nuuo [...]

Urban Massage Exposed a Huge Customer Database

2018-11-29T15:59:48-07:00November 30th, 2018|Tags: , , |

A popular massage-booking app has exposed 309,000 customer profiles, including comments from their masseurs or masseuses on how creepy their customers are. The app’s wide-open, no-password-required database was discovered by researcher Oliver Hough, who tipped off TechCrunch. Hough said in a tweet [...]

Go to Top