Unmanned Ariel Vehicles a.k.a Drones – Pose Serious Threat to Privacy

Unmanned Ariel Vehicles a.k.a Drones – Pose Serious Threat to Privacy

Gone are the days when Unmanned Aerial Vehicle, Unnamed Aircrafts or Flying Drones were only frequented in James Bond Movies. With the surge in technological advancements, these awesome little vehicles are already being made and used by Governments, Companies and Individuals alike to suit their recurrent requirements. As funny as...
Latest entries
Shielding Wireless Network, Or A Couple Of Ways To Avoid Wi-Fi Trouble

Shielding Wireless Network, Or A Couple Of Ways To Avoid Wi-Fi Trouble

We all use wireless networks and most of the Internet users have their own Wi-Fi routers at home, that is really convenient, especially if you have a couple of gadgets, that need an Internet connection. But the main problem with those is that users actually stop thinking about the security of their home wireless network...
Indoor Navigation Feature of iOS7 - iBeacon, Can It Harm Our Privacy?

Indoor Navigation Feature of iOS7 – iBeacon, Can It Harm Our Privacy?

New verson of Apple’s operation system has a lot of new features, one if them is iBeacon, which we would like to discuss today. There are lots of info on that feature on the internet, they say that it will change the market of mobile payments, indoor navigation and will be a killer of NFC....
Electronic Number Plates And RFID Driver's Licenses Against Privacy

Electronic Number Plates And RFID Driver’s Licenses Against Privacy

Today we at Jammer-Store would like to highlight the question of the driver’s privacy protection in USA. Recent activities of our government look rather suspicious and we believe that they should be discussed. You probably heard about the idea to equip all the cars with electronic number plates, that can be configured and controlled remotely....
NSA Can Get Any Data Stored On Your Smartphone - Spiegel Reports

NSA Can Get Any Data Stored On Your Smartphone – Spiegel Reports

It seems that the scandal around of NSA is not going to go down, because various social medias get more and more information about illegal activities of that organization. We all know that NSA is gathering private information of US citizens and try to tell us that is done to fight terrorists. Well, now those...
US Government Has "Stolen" The Internet. How To Get It Back?

US Government Has “Stolen” The Internet. How To Get It Back?

Bruce Schneier, one of the world’s most prominent cyber security specialist has recently published an article at The Guardian, where he has described how weak our information security really is. He has also told about the contribution NSA has given to it. He told that the government and major commercial structures have betrayed Internet and...
Top 5 Modern Wireless Gadgets That Can Steal Your Personal information

Top 5 Modern Wireless Gadgets That Can Steal Your Personal information

Portable gadgets make our life more convenient, but did you know that they may be dangerous sometimes? That’s why we’d like to show you the top five mobile gadgets, that can be used to spy on you and steal your personal information. The initial research was made by Reticle Research group, but we’ve added a...
Wi-Fi Protocol Vulnerability Exposes WP 7 And 8 User's Personal Data

Wi-Fi Protocol Vulnerability Exposes WP 7 And 8 User’s Personal Data

If you reading our blog from time to me, you’ve probably noticed that we think that smartphones are the greatest threat to our privacy, and that is the main reason why we try to highlight privacy and security problems with those portable devices. The main reason why they are so dangerous is people. Users tend...
Security Of Mobile Internet Connections From The Inside: How It Works?

Security Of Mobile Internet Connections From The Inside: How It Works?

With a wast development of mobile GSM networks mobile Internet develops and grows too. We’ve already got used to an ordinary Internet, based on TCP/IP protocol, but how mobile Internet works? Today we at Jammer-Store Inc. will explain you how that works and see, if there are some vulnerable spots out there. Also we’ll try...
CreepyDOL And F-BOMB - Mobile Spying Network With Raspberry Pi

CreepyDOL And F-BOMB – Mobile Spying Network With Raspberry Pi

If you our constant reader you probably see that we at jammer-store.com try to highlight and describe the most urgent problems with personal security and privacy protection, and that post is actually about that. In that post we would like to show you how weak our privacy is and how is it can be breached....
XKeyscore Project – NSA's Ultimate Spying And Data Mining Tool

XKeyscore Project – NSA’s Ultimate Spying And Data Mining Tool

A couple of hours ago we’ve had a question at our wiki service, regarding the XKeyscore project and we promised to provide a blog post on the topic with the information on the possible means on protecting your personal data from that NSA’s ultimate spying tool. So here it goes, but at first, we should...
DES Encrypted SIM Cards Vulnerability: Is It As Dangerous As It Seems?

DES Encrypted SIM Cards Vulnerability: Is It As Dangerous As It Seems?

Recently we’ve had a question, at our wiki QA service, regarding vulnerable DES encrypted SIM cards and the ways of protection. The news about that exploit have been all over the web and Google gives hundreds of thousands results for «750 millions of vulnerable SIM cards». In this article we at Jammer-Store will try to...
Google Has Fixed Glass Remote Access Exploit With Malicious QR Codes

Google Has Fixed Glass Remote Access Exploit With Malicious QR Codes

We answer lots of question of our readers at our wiki QA service everyday, and some of those questions are so deep or really important, that we have to write a whole blog post to answer it clearly and in full scale. And the question about recently discovered Google Glass vulnerability is exact match. Lookout...