Logged into same network of residence, owner knows my Mac address.. what can they see? [on hold]

Logged into same network of residence, owner knows my Mac address.. what can they see?

They are techy and know my Mac address for my phone and PC.
Can they see text message to and from me? My email? My pictures and documents… Continue reading Logged into same network of residence, owner knows my Mac address.. what can they see? [on hold]

Security Boulevard’s 5 Most Read Stories for the Week, August 06-10

A new week, a new crop of security stories. Last week, U.S. Military ‘Reaper Drone’ Designs, Eavesdropping on mobile devices, Making security priority and Multifactor authentication adoption made the headlines. In addition, we discussed why that XKCD … Continue reading Security Boulevard’s 5 Most Read Stories for the Week, August 06-10

State of Eavesdropping on Mobile Devices

Eavesdropping is a prevailing threat among many on mobile phones, with technology capable of tracking users, listening to their conversations and even logging their application usage becoming more pervasive and easier to come by. “Mobile devices conta… Continue reading State of Eavesdropping on Mobile Devices

Using An AI And WiFi To See Through Walls

It’s now possible to not only see people through walls but to see how they’re moving and if they’re walking, to tell who they are. We finally have the body scanner which Schwarzenegger walked behind in the original Total Recall movie.

This is the work of a group at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL). The seeing-through-the-wall part is done using an RF transmitter and receiving antennas, which isn’t very new. Our own [Gregory L. Charvat] built an impressive phased array radar in his garage which clearly showed movement of complex shapes behind a wall. What is …read more

Continue reading Using An AI And WiFi To See Through Walls

Susceptibility of 7z encrypted archive files to man in the middle attacks

Given:

A file (assume 1 GB in size) is encrypted along with filenames using 7zip into a 7z archive using AES-256
The file is uploaded to a cloud storage service such as those offered by Google, Amazon, or Microsoft
The file… Continue reading Susceptibility of 7z encrypted archive files to man in the middle attacks