Posts Tagged ‘ security ’

Everything is broken

May 24, 2014
Everything is broken

#InfoSec Reshared post from +Ward Mundy If you read nothing else about Internet Security, read this… https://medium.com/message/81e5f33a24e1 #linux   #internet   #security   #voip   #asterisk  ? Everything Is Broken Once upon a time, a friend of mine accidentally took over thousands of computers. He had found a vulnerability in a piec… This post has […]

Tags: , , , , ,
Posted in Google+ | 4 Comments »

Voodoo Carrier IQ detector now available

December 2, 2011
Voodoo Carrier IQ detector now available

You may have heard that an Android developer recently discovered an application running on most Android smartphones that tracks your location, keystrokes, and collects other personal information such as phone number, browsing information, contacts, and the keylogger could snag passwords and other sensitive information you enter into your phone. Now, there's a new Android app […]

Tags: , , , , ,
Posted in Google+ | 7 Comments »

Social Hacking

November 4, 2011
Social Hacking

In the old days, a lot of "hacking" actually consisted of knowing how to talk your way into a situation or convincing someone you knew what you were doing and were supposed to be there or to have access to something you shouldn't. Businesses and security firms continue to focus heavily on physical security in […]

Tags: , , , ,
Posted in Google+ | 2 Comments »

Indirect MITM attack

October 29, 2011

Traffic being sent to an Amazon Web Services ELB (elastic load balancer) intended for a Netflix API server was inadvertently being delivered to a different user, to the tune of over 2M requests over 4 days. This kind of mix-up could unintentionally cause a "man in the middle" attack, sending private information to a third […]

Tags: , , , , , ,
Posted in Google+ | 1 Comment »

Oops, I missed it

October 26, 2011

I just heard about it being Cyber Security Awareness month a few days ago. Someone needs to fire the marketing committee. Or hire one, whichever fits. Tags: #Tech #Geek #infosec #security #marketing #malware #hangouts Reshared post from +Jeremy Lubin Friends, did you know that we're in the midst of Cyber Security Awareness Month? To do […]

Tags: , , , , , ,
Posted in Google+ | No Comments »

Who Else Was Hit by the RSA Attackers?

October 24, 2011
Who Else Was Hit by the RSA Attackers?

This article by Krebs on Security provides expanded details on the recent RSA attackers, including an extensive "list of companies whose networks were shown to have been phoning home to some of the same control infrastructure that was used in the attack on RSA." At the bottom of the article is a graph depicting the […]

Tags: , , , , ,
Posted in Google+ | No Comments »

New Security Threat: Infected QR Codes

October 21, 2011
New Security Threat: Infected QR Codes

The title of this article is a little misleading, as the QR codes themselves are not infected but rather it was used to lure people to download an app or game that was malicious. The QR code itself is just a barcode containing text, typically a URL, Email address, or contact information. Luckily most smartphones […]

Tags: , , , , , ,
Posted in Google+ | 3 Comments »

Why is it so hard to understand that we allow NO SPAM?

October 16, 2011

I just cancelled another server, I'm sure he'll go somewhere else that won't care. Some people don't understand what constitutes SPAM (at least in my book) unless it's being sent to them. If you're getting multiple complaints daily, then most likely the list you are sending to didn't really opt-in to receive your content. Purchasing […]

Tags: , , , , ,
Posted in Google+ | 15 Comments »

So, the Predator and Reaper drones have been infected with a virus that contains…

October 8, 2011
So, the Predator and Reaper drones have been infected with a virus that contains…

So, the Predator and Reaper drones have been infected with a virus that contains a keylogger among other things and has hit both classified and unclassified systems. They have been unable to remove the virus, so they continue to use the systems under the belief that no classified data has been compromised. They've known about […]

Tags: , , , ,
Posted in Google+ | No Comments »

Switch to our mobile site