Most Popular

1500 questions
67
votes
8 answers

Can a stolen Android phone with USB debugging enabled have screen lock bypassed?

My Android (8.0) phone was pickpocketed from me yesterday. It was immediately turned off by the thief and when I tried to locate it using Find My Device it shows as offline. As a programmer and a security enthusiast, I started to worry about what…
gtbono
  • 693
  • 1
  • 5
  • 6
67
votes
7 answers

How to investigate an unknown 1.5GB file named "sudo" in my Linux home directory?

I found a file in my home directory named "sudo". It's 1.5GB in size and I have no idea where it came from. -rw-r--r-- 1 foo foo 1598296064 Aug 9 11:22 sudo Does anybody have any tips on how to proceed investigating this file? I fear that my…
AccidentalRebel
  • 603
  • 1
  • 5
  • 7
67
votes
4 answers

Why is so much ransomware breakable?

The site: https://www.nomoreransom.org/ offers many decrypter tools for ransomware. But why? It shouldn't be so hard to use the Windows Crypto API (e.g. just google "create AES Key in Windows") to create AES Keys, encrypt them with a locally…
kiara
  • 681
  • 1
  • 6
  • 9
67
votes
17 answers

Alternative to sending password over mail?

Recently I've started working as a contractor for a company, which requires me to often log in to different b2b services. The way I receive the login data is usually over email in plain text. My gut feeling tells me sending sensitive data in plain…
aMJay
  • 3,645
  • 5
  • 11
  • 20
67
votes
10 answers

Why check your email in haveibeenpwned rather than regularly changing your password regardless of any leaks?

There's a lot of news right now about haveibeenpwned but I don't understand why people need a service like that in first place. If you're a security conscious user, you'd change your passwords regularly on any website that matters (banking, email,…
JonathanReez
  • 1,046
  • 1
  • 7
  • 16
67
votes
5 answers

Advised to block all traffic to/from specific IP addresses

My CFO received an email from a director at a financial institution advising that all traffic (inbound and outbound) from certain IP addresses should be blocked at the firewall. The director at the financial institution was advised by his IT…
upsidedowncreature
  • 761
  • 1
  • 5
  • 7
67
votes
4 answers

Can I get a public key from an RSA private key?

As far as I remember you encrypt the message using public key and decrypt it using private key. My question is whether it is possible to get a public key from an RSA private key. For example if I have a key like this: -----BEGIN RSA PRIVATE…
user162408
  • 661
  • 1
  • 5
  • 4
67
votes
5 answers

Why is iPhone's internal storage so hard to crack/decrypt?

I’ve heard about a rule in Information Security, that once a hacker has access to your physical machine, then it’s all over. However, there seems to be a big exception to this rule: iPhones. It was all over the news a while back that the CIA (or the…
Melkor
  • 1,295
  • 2
  • 11
  • 13
67
votes
4 answers

Are there any security risks in replying to an SMS message?

I routinely receive seemingly harmless SMS messages from unknown people. They're usually simple, like "Hi" or "Hello" or "Are you there?". This happens several times a week, and certainly often enough that it seems to be some sort of organized,…
Caleb
  • 649
  • 1
  • 5
  • 7
67
votes
3 answers

Why shouldn't I bring a computer to a key-signing party?

I'm looking at the event description for the key-signing party at an upcoming BSD conference, and it's mentioned that I shouldn't bring my computer in to the event: Things to bring no computer What risks does bringing a computer into a…
Jules
  • 1,240
  • 1
  • 10
  • 20
66
votes
6 answers

Should I be afraid of biometric IDs?

The Israeli Minister of the Interior is pushing legislation to introduce biometric IDs. On the one hand I hear his argument that it can help to prevent identity theft. On the other hand, something makes me very nervous about having my biometric…
Shaul Behr
  • 1,027
  • 1
  • 9
  • 16
66
votes
9 answers

Why does one need a high level of privacy/anonymity for legal activities?

This question is sort-of spun off of a previous one. Why do law-abiding citizens need strong security? There are a lot of great security-focused answers there. However, I think the true question that is brought up is more about privacy and…
Iszi
  • 27,027
  • 18
  • 99
  • 163
66
votes
4 answers

Is there a reason to use TrueCrypt over VeraCrypt?

I am looking to encrypt a few drives of mine, and my ONLY interest is security. It is OK if my VeraCrypt volumes are not compatible with TrueCrypt, and vice versa. There is a lot of talk about "TrueCrypt is dead" and it seems there are two forks…
Radmilla Mustafa
  • 1,018
  • 3
  • 10
  • 12
66
votes
14 answers

Sending passwords to someone remotely

As someone who usually works with people in other countries it has always been a problem to send login information to each-other. For development login details like debug databases etc sure I can send them over in clear text email or something but…
user36976
  • 3,233
  • 4
  • 15
  • 22
66
votes
3 answers

Heartbleed: Why does the client supply the length of the message at all?

"The fix for this bug is simple: check that the length of the message actually matches the length of the incoming request." Why do we even have the client report the length at all? If we can know the length of the incoming request, can't we just…
Elliot
  • 743
  • 5
  • 9