Hack Multifactor Authentication Password Management
biometric data

Hacking fingerprint recognition for 5$

Biometric authentication techniques have gained momentum over the past few years due to the inherent vulnerability of PINs, passwords, and other similar verification methods. With that said, researchers have shared how a simple fingerprint hacking technique can render biometric authentication useless as a verification method for around 5$. Steps:1. Grab a photograph of someone’s fingerprint […]

Security SOC Vulnerability

How to defend with(out) a SOC as first defense?

Do you want to understand the modern cyber threats and the most commonly used attack surfaces behind any malware/cyber-attack?Don’ts:1.) Don’t give everything easily to the attacker, make it harder for him to get. (Control Measures in the network)2.) Don’t enable legitimate vulnerable application if not in use, attackers always use legit applications in the network. (Abuse […]

Biometrics EIDAS

Secure and trusted European digital ID by 2030

In its latest ambitious digital policy announcement, the European Union has proposed creating a framework for a “trusted and secure European e-ID” (aka digital identity) — available to all citizens, residents and businesses to make it easer to use a national digital identity to prove who they are in order to access public sector or […]

GDPR Privacy

Several Android devices to collect and share data on a large scale

Several popular Android phones have been found to collect and share data on a large scale, including with third parties, and users cannot opt ​​out, according to researchers from Trinity College Dublin and the University of Edinburgh. The study https://lnkd.in/eiVzvJj3 examined six variants of the Android operating system, namely those from Samsung, Xiaomi, Huawei, Realme, LineageOS and […]