This $39 Device Can Defeat iOS USB Restricted Mode

The most spoken thing about iOS 11.4.1 is undoubtedly USB Restricted Mode. This highly controversial feature is apparently built in response to threats created by passcode cracking solutions such as those made by Cellerbrite and Grayshift. We performed several tests, and can now confirm that USB Restricted Mode is maintained through reboots, and persists software restores Read more about This $39 Device Can Defeat iOS USB Restricted Mode[…]

Disable Fingerprint And Facial Recognition

Opening your phone with your fingerprint or facial recognition is cool and convenient. But it also means people can easily unlock your phone without permission – while in the process of being robbed say, or if you’re arrested on suspicion of committing a crime yourself. Thankfully iOS and Android let you temporarily turn off fingerprint Read more about Disable Fingerprint And Facial Recognition[…]


Nitrokey is an USB key to enable highly secure encryption and signing of emails and data, as well as login to the Web, networks and computers. Other than ordinary software solutions, the secret keys are always stored securely inside the Nitrokey. Their extraction is impossible which makes Nitrokey immune to computer viruses and Trojan horses. Read more about Nitrokey[…]

Send Invisible Messages

FontCode has the advantage of moving between digital and physical mediums, which could have specific applications in high-stakes espionage. And the researchers note that FontCode messages can be additionally encrypted if the sender and receiver agree on a key for reordering whatever data is embedded in a given text. Plus, the technique’s more mainstream uses Read more about Send Invisible Messages[…]

Accessing Cell Phone Location Information

The New York Times is reporting about a company called Securus Technologies that gives police the ability to track cell phone locations without a warrant. The service can find the whereabouts of almost any cellphone in the country within seconds. It does this by going through a system typically used by marketers and other companies to get location data Read more about Accessing Cell Phone Location Information[…]

Rogue One – cybersecurity videotraining

Last year we analyzed an incident depicted in Star Wars: Episode IV. However, we got the feeling even back then that the security failures that led to the destruction of the Death Star were only the tip of the iceberg. The Empire’s problems with information systems security are clearly of a more galactic nature. Fortunately, Read more about Rogue One – cybersecurity videotraining[…]

Macrium Reflect – cloning and imaging software for Windows

The ability to restore your system to an earlier point in time is extremely valuable, as it can save you many hours normally required to install and configure a machine should things go wrong and necessitate a complete rebuild. Whether it’s a bad system update, malware or a total physical loss of your computer this Read more about Macrium Reflect – cloning and imaging software for Windows[…]


The YubiKey is a hardware authentication device manufactured by Yubico that supports one-time passwords, public key encryption and authentication, and the Universal 2nd Factor (U2F) protocol developed by the FIDO Alliance (FIDO U2F). It allows users to securely log into their accounts by emitting one-time passwords or using a FIDO-based public/private key pair generated by the device. Read more about YubiKey[…]