Demystifying SSD Security

You left your laptop in a taxi or it was confiscated at a customs checkpoint. How do you ensure your personal or corporate data is safe? There are a number of best practices to follow. SSD Best Practices Step 1: Shut down your device in public spaces … Continue reading Demystifying SSD Security

NIST tests methods of recovering data from smashed smartphones

Criminals have found to their cost that reducing a device to a pile of rubble means nothing if the internal chips are still in working order. Continue reading NIST tests methods of recovering data from smashed smartphones

Beware of Fake USB Chargers that Wirelessly Record Everything You Type, FBI warns

Last year, a white hat hacker developed a cheap Arduino-based device that looked and functioned just like a generic USB mobile charger, but covertly logged, decrypted and reported back all keystrokes from Microsoft wireless keyboards.

Dubbed KeySweepe… Continue reading Beware of Fake USB Chargers that Wirelessly Record Everything You Type, FBI warns

Canadian Police obtained Master Key to Crack BlackBerry Messenger Encryption

BlackBerry has long been known for its stance on mobile security, as it was the first mobile phone maker to provide end-to-end encryption. But a new report revealed that the company has provided a master backdoor to law enforcement in its secure device… Continue reading Canadian Police obtained Master Key to Crack BlackBerry Messenger Encryption