A Faraday bag is a type of Faraday cage. It protects electronics from being damaged by radio frequency interference (RFI) or from an electromagnetic pulse (EMP) by not allowing radio frequency or electromagnetic pulse waves to pass through the material.
It goes by a lot of names such as RFID bag, RFID blocking bag, or EMP bag.
How a Faraday bag works?
It creates a completely enclosed space that is surrounded by a mesh of conducting materials. When an electrical field on the outside of the Faraday cage interacts with the material, it causes the charges within the protected space to be distributed in a way that cancels the effects. It also works to protect against radio frequency interference.
This way the hackers, thieves, or government agencies who are trying to track your phone or any other device will not be able to get to it because of the outer layer of the Faraday bag.
In the latest campaign, we have seen several apps impersonated by the malware: the ad blockers AdShield and Netshield, as well as the Opendns service. This article analyzes only fake AdShield app, but all the other cases follow the same scenario.
According to data from kasperskysecuritynetwork, at the time of preparing this article, since the beginning of February 2021, there have been attempts to install fake apps on the devices of more than 7 thousand users. At the peak of the current campaign, more than 2,500 unique users per day were attacked, with most of the victims located in russia and CIS countries.
Deepfake is taking space from our daily life. Recently South Korea has replaced a new anchor with deep fake person (i.e look like real person). You might have seen recent Tom Cruise videos and those are deep fake. We are at the stage where it is becoming hard to distinguish between fake vs real videos & audio’s.
Despite the negative connotations surrounding the colloquial term deepfakes (people don’t usually want to be associated with the word “fake”), the technology is increasingly being used commercially.
More politely called AI-generated videos, or synthetic media, usage is growing rapidly in sectors including news, entertainment and education, with the technology becoming increasingly sophisticated.
The REvil ransomware operation announced this week that they are using DDoS attacks and voice calls to journalists and victim’s business partners to generate ransom payments.
The REvil ransomware operation, also known as Sodinokibi, is a ransomware-as-a-service (RaaS) where the ransomware operators develop the malware and payment site, and affiliates (adverts) compromise corporate networks to deploy the ransomware.
Security researcher Laxman Muthiyah has found a critical bug in Microsoft identity manager and he has been rewarded $50,000 prize money. Here is his snippet of hack.
After my Instagram account takeover vulnerability, I was searching for similar loopholes in other services. I found Microsoft is also using the similar technique to reset user’s password so I decided to test them for any rate limiting vulnerability.
To reset a Microsoft account’s password, we need to enter our email address or phone number in their forgot password page, after that we will be asked to select the email or mobile number that can be used to receive security code.