Unmanned Ariel Vehicles a.k.a Drones – Pose Serious Threat to Privacy

Unmanned Ariel Vehicles a.k.a Drones – Pose Serious Threat to Privacy

Gone are the days when Unmanned Aerial Vehicle, Unnamed Aircrafts or Flying Drones were only frequented in James Bond Movies. With the surge in technological advancements, these awesome little vehicles are already being made and used by Governments, Companies and Individuals alike to suit their recurrent requirements. As funny as...
Latest entries
Top 5 Modern Wireless Gadgets That Can Steal Your Personal information

Top 5 Modern Wireless Gadgets That Can Steal Your Personal information

Portable gadgets make our life more convenient, but did you know that they may be dangerous sometimes? That’s why we’d like to show you the top five mobile gadgets, that can be used to spy on you and steal your personal information. The initial research was made by Reticle Research group, but we’ve added a...
Wi-Fi Protocol Vulnerability Exposes WP 7 And 8 User's Personal Data

Wi-Fi Protocol Vulnerability Exposes WP 7 And 8 User’s Personal Data

If you reading our blog from time to me, you’ve probably noticed that we think that smartphones are the greatest threat to our privacy, and that is the main reason why we try to highlight privacy and security problems with those portable devices. The main reason why they are so dangerous is people. Users tend...
Security Of Mobile Internet Connections From The Inside: How It Works?

Security Of Mobile Internet Connections From The Inside: How It Works?

With a wast development of mobile GSM networks mobile Internet develops and grows too. We’ve already got used to an ordinary Internet, based on TCP/IP protocol, but how mobile Internet works? Today we at Jammer-Store Inc. will explain you how that works and see, if there are some vulnerable spots out there. Also we’ll try...
CreepyDOL And F-BOMB - Mobile Spying Network With Raspberry Pi

CreepyDOL And F-BOMB – Mobile Spying Network With Raspberry Pi

If you our constant reader you probably see that we at jammer-store.com try to highlight and describe the most urgent problems with personal security and privacy protection, and that post is actually about that. In that post we would like to show you how weak our privacy is and how is it can be breached....
XKeyscore Project – NSA's Ultimate Spying And Data Mining Tool

XKeyscore Project – NSA’s Ultimate Spying And Data Mining Tool

A couple of hours ago we’ve had a question at our wiki service, regarding the XKeyscore project and we promised to provide a blog post on the topic with the information on the possible means on protecting your personal data from that NSA’s ultimate spying tool. So here it goes, but at first, we should...
DES Encrypted SIM Cards Vulnerability: Is It As Dangerous As It Seems?

DES Encrypted SIM Cards Vulnerability: Is It As Dangerous As It Seems?

Recently we’ve had a question, at our wiki QA service, regarding vulnerable DES encrypted SIM cards and the ways of protection. The news about that exploit have been all over the web and Google gives hundreds of thousands results for «750 millions of vulnerable SIM cards». In this article we at Jammer-Store will try to...
Google Has Fixed Glass Remote Access Exploit With Malicious QR Codes

Google Has Fixed Glass Remote Access Exploit With Malicious QR Codes

We answer lots of question of our readers at our wiki QA service everyday, and some of those questions are so deep or really important, that we have to write a whole blog post to answer it clearly and in full scale. And the question about recently discovered Google Glass vulnerability is exact match. Lookout...
Social Networks Are The Reason Of 91% Of All Corporate Data Leaks

Social Networks Are The Reason Of 91% Of All Corporate Data Leaks

Worldwide popularity of social networks is growing and more and more can’t resist the pleasure of surfing through the pages of their friends. And if earlier the main auditory of the social networks was mostly youth, now it is a platform for communications between people of any age and social status. But social networks are...
Recently Found Android Vulnerability May Turn Any App Into Malware

Recently Found Android Vulnerability May Turn Any App Into Malware

Bluebox Security Labs research group has recently discovered and published some information on the vulnerability of Android security core, which gives a chance to modify application’s .apk code, without confirming and compromising a cryptographic signature of the app itself. Using that security hole, evildoers may be able to turn literary any application into a malicious...
NSA Admits That It Is Wiretapping All The Phone Calls In The USA

NSA Admits That It Is Wiretapping All The Phone Calls In The USA

During the closed-doors meeting at the Capitol, NSA executives admitted, that they do not reqeuire a special warrant to wiretap domestic phone calls in USA. New York Congress representative from US Democratic Party, Jerrold Nadler literary stated that a decision to wiretape someone’s mobile calls may be taken by a simple analytic.
RoboRoach - How To Turn A Simple Cockroach Into A Spying Cyborg?

RoboRoach – How To Turn A Simple Cockroach Into A Spying Cyborg?

We at Jammer-Store always try to monitor all the latest inventions and gadgets, that can pose danger to our privacy. And the gadget we will tell about today — is a prominent example of how a thing that looks rather safe and even a little silly, may turn into powerful spying tool.
WiSee Project: Seeing Through The Wall With A Simple Wi-Fi Router!

WiSee Project: Seeing Through The Wall With A Simple Wi-Fi Router!

What is WiSee? We’ve had a question on it at our wiki QA service today and that topic just caught our minds, so we’ve decided to write a post about it. It is a quite interesting project, created by Washington University specialists. The prototype of WiSee system uses Wi-Fi signals to identify human gestures and...