Telegram leaked IP addresses of its desktop app users

By Waqas
The vulnerability affected Telegram’s desktop app for Windows, Mac, and Linux OS. Telegram, a popular privacy-focused instant messaging application, reportedly contained a bug that can leak the IP addresses of users. Known for providing end-to… Continue reading Telegram leaked IP addresses of its desktop app users

CVE-2018-17780: Telegram Bug Found to Leak IP Addresses During Calls

A new Telegram bug has been recently discovered which leaks the public IP addresses of the callers. It appears that the reason for this is a default configurations option which has been found to cause this behavior. CVE-2018-17780: Serious Telegram…R… Continue reading CVE-2018-17780: Telegram Bug Found to Leak IP Addresses During Calls

Is it Unlawful to Collect or Store TCP/IP Log Data for Security Purposes?

It is a common and accepted practice for entities to collect, store, process and analyze log data. This log data includes the IP addresses of every person (computer) that accessed or attempted to access the network, the website or the process. These l… Continue reading Is it Unlawful to Collect or Store TCP/IP Log Data for Security Purposes?

007 Spectre, IP Address, and Military Hijackers – Hack Naked News #181

This week, fake tech support, your picture is your password, 007 to the rescue, Shun the non-believers or at least IP address hijackers, hacking the military with a router vulnerability, IoT search engines reveal passwords. Jason Wood from Paladin Secu… Continue reading 007 Spectre, IP Address, and Military Hijackers – Hack Naked News #181

New EU Privacy Laws Will Complicate B2B Data Sharing

Exploring the legality of the international business-to-business sharing of IP addresses within the cyber threat intelligence community. Continue reading New EU Privacy Laws Will Complicate B2B Data Sharing

Networking: Pin the Tail on the Headless Raspberry Pi

Eager to get deeper into robotics after dipping my toe in the water with my BB-8 droid, I purchased a Raspberry Pi 3 Model B. The first step was to connect to it. But while it has built-in 802.11n wireless, I at first didn’t have a wireless access point, though I eventually did get one. That meant I went through different ways of finding it and connecting to it with my desktop computer. Surely there are others seeking to do the same so let’s take a look at the secret incantations used to connect a Pi to a computer directly, …read more

Continue reading Networking: Pin the Tail on the Headless Raspberry Pi