Tag : Security
Sometimes, people just make it too easy to get broken into ...
[view] [2,224 page views]
Those charts showing cannot be broken without eons of calculations always fall apart when somebody says, "done!"
[view] [1,875 page views]
How do the modern operating system stack up against public vulnerability scans?
[view] [152,336 page views]
It's been 25 years since PGP was released and the software has quite the history being at odds with the US government.
[view] [8,308 page views]
The only thing more vulnerable to getting infected and used by everyone is your Mom.
[view] [2,455 page views]
Hackers are always ahead of the curve.
[view] [3,736 page views]
You're not supposed to know that it's everyone.
[view] [1,555 page views]
DRM never works out the way companies think it will.
[view] [6,396 page views]
The demo of this product ... is pretty damn amazing.
[view] [3,703 page views]
Is it really advanced? Or is it just not XOR?
[view] [1,672 page views]
The only way to not get logged these days ... is to not use your computer.
[view] [2,693 page views]
Nobody cares about ICS-SCADA until their lights turn off.
[view] [2,744 page views]
When your "always on" phone is spying on you ... game over man!
[view] [1,742 page views]
Maybe ... Sony should try NOT fucking its customers?
[view] [3,367 page views]
Is anybody really surprised these aren't very secure?
[view] [10,429 page views]
What's in those Huawei devices that has everyone so spooked?
[view] [1,437 page views]
Thanks D-Link for the remote administration feature - I really wanted to make sure the random IT support guy from India could access my stuff.
[view] [1,931 page views]
In the wake of the Edward Snowden leaks against the NSA, it was interesting to be an audience member at both BlackHat and DEFCON in 2013.
[view] [2,598 page views]
Always use a VPN ... thought that wouldn't help from the cellular service point of view.
[view] [1,987 page views]
No system is ever secure.
[view] [2,019 page views]
"I don't know my job" is not acceptable anywhere else in the military, why does cyber accept that in it's leadership ranks?
[view] [1,716 page views]
At least the technique doesn't require a bunch of severed thumbs.
[view] [1,239 page views]
Everyone should have a BotNet ... such useful tools!
[view] [2,913 page views]
Everything is an advertising/marketing/intelligence sensor - including your cell phone.
[view] [1,512 page views]
Are there really people that still believe US adversaries aren't taking advantage of the US?
[view] [2,487 page views]
China got caught with their pants down.
[view] [1,638 page views]
This doesn't bode well for the future stability of the American power grid.
[view] [3,642 page views]
You can always trust your secure gear ... until you can't.
[view] [11,854 page views]
Botnet evolution is very fascinating.
[view] [1,538 page views]
As long as it's not discovered publicly and revenue isn't lost, they don't care.
[view] [6,387 page views]
When you're not gaming - you're hashing.
[view] [5,927 page views]
When China steals your data ... and your solution is to then give your data to them willingly to protect ... you might work for the US government.
[view] [3,269 page views]
Can you ever really trust anything anymore?
[view] [3,414 page views]
Now your computer can have a digital "Enron Shredding Party", too.
[view] [1,581 page views]
As if the Internet wasn't already untrustworthy, it's becoming too easy to fabricate everything.
[view] [1,492 page views]
Without a "Battle Damage Assessment," you'll have no idea if its working.
[view] [2,814 page views]
For 18 minutes in 2010, a BGP anomaly resulted in nearly 15% of the Internet's traffic being routed through China. What really happened?
[view] [5,382 page views]
Everything you do leaves a trace, whether in meatspace or cyberspace.
[view] [2,665 page views]
Who names this shit?
[view] [1,961 page views]
Tired of social media sites harvesting your personal information and contact circles?
[view] [2,801 page views]
Iran's SCADA is the Poland of Cyberspace
[view] [1,489 page views]
Upgrades never go smoothly.
[view] [1,606 page views]
The administration leaks success stories like a sieve.
[view] [1,550 page views]
The long arm of the law touches the Matrix.
[view] [2,749 page views]
Botnets to kill botnets - terrible idea? Good idea?
[view] [22,180 page views]
So basically, wear gloves, sunglasses, a hat ... and never go outside.
[view] [1,340 page views]
Many people forget how legacy hardware technologies can be used to completely bypass software controls.
[view] [6,571 page views]
All these interconnected things literally NEVER get security updates.
[view] [1,587 page views]
Because you need to harvest credentials, that's why.
[view] [6,925 page views]
Just need a magnetic stripe programmer and an anonymous server for the pumps to beacon out to ...
[view] [3,068 page views]
[view] [1,772 page views]
Government ... they're good listeners.
[view] [2,070 page views]
... because password cracking iss such a gateway drug to hacking.
[view] [1,722 page views]
Obviously the public WiFi point should be yours ... get rid of the other pesky users to speed up your connection.
[view] [3,774 page views]
IRCd-Hybrid does not have SSL enabled and requires some workarounds to secure its connections. This tutorial will get an IRCd-Hybrid server running, linked to other servers, and secured with SSL.
[view] [17,655 page views]
Do you know what your TV is doing on the Internet?
[view] [8,273 page views]
Your Amazon Echo is always connected and allegedly always listening ... what network traffic is it generating?
[view] [10,818 page views]
More than merely cut 'n paste, this tool ensures light direction, shadows, reflections, etc. are all accounted for.
[view] [3,448 page views]
[view] [1,334 page views]
Sometimes the law decides the 5th Amendment is optional?
[view] [1,974 page views]
Despite the weakness, everyone still relies upon the tech.
[view] [1,431 page views]
Why are manufacturers of "smart" home electronics making them openly visible on the Internet?
[view] [3,140 page views]
Immunity via obscurity is becoming less of a truism.
[view] [1,558 page views]
It's almost like the movies ... where the thieves have a hacker that can reroute all the traffic to facilitate their getaway.
[view] [1,649 page views]
Getting underneath the system gives you ALL the power.
[view] [3,057 page views]
... you tricky malware writers!
[view] [2,422 page views]
Everyone can appreciate a good listener right?
[view] [7,597 page views]
If you can step on a cyber-poncho, we certainly did it.
[view] [1,905 page views]
Physical access always wins ...
[view] [1,366 page views]
An entire program written with nothing but MOV instructions?
[view] [3,047 page views]
Hackers are ever so clever in skirting past security mechanisms.
[view] [2,100 page views]
Sounds sort of like a cyber version of "The Purge."
[view] [1,583 page views]
Botnets are lovely pieces of software for studying program survivability.
[view] [3,683 page views]
Do you trust them to protect you?
[view] [1,417 page views]
Backwards compatibility lets old bugs stay relevant!
[view] [1,556 page views]
Who needs a key when all the doors are already open?
[view] [1,533 page views]
I felt like vulnerability scanning various common operating systems and hardware I had lying around to see what the likelihood was of getting script p0wn'd.
[view] [18,407 page views]
You never know who is actually reading your content. On OmniNerd, the content posted by the site's users actually attracted a posting by terrorist sympathizers.
[view] [11,674 page views]
Now that's a tutorial!
[view] [2,052 page views]
... because own all the things!
[view] [1,999 page views]
Everyone wants privacy until it protects pedophiles and terrorists.
[view] [2,802 page views]
A rootkit is the apex of modern malware, eclipsing both viruses and worms, yet their function are the least publicly understood.
[view] [54,725 page views]
It's fun to mess with normal.
[view] [5,401 page views]
There will never be security when a culture of insecurity exists.
[view] [1,743 page views]
I received a phishing e-mail one day and decided to take a look into just how those attacks do their deed. With a few simple tools, its possible to derive a lot of information using only static analysis against malware.
[view] [17,774 page views]
The ones who suck at literally everything, aren't faring so well at protecting their data.
[view] [1,840 page views]
Considering how much the public wants gun violence suppressed, crippling law enforcement's ability to infiltrate criminal plans seems misguided.
[view] [1,556 page views]
To expose ... or not to expose?
[view] [1,928 page views]
Ten years from now, what other obvious security vulnerability will we smack our foreheads over?
[view] [2,836 page views]
Using other people's failures to your advantage is the mantra of Computer Science.
[view] [3,368 page views]
Self driving cars should make things safer by taking unreliable human drivers out of the mix - unless we mess with them.
[view] [1,508 page views]
Now everyone can play with malware.
[view] [625 page views]
Centralized trust is great until the trusted party screws it all up.
[view] [1,666 page views]
There are a lot of ways to get around an operating system.
[view] [3,406 page views]
It doesn't take a strong RF signal anymore to enable a TEMPEST attack.
[view] [9,232 page views]
Too bad it only run the whole Internet.
[view] [1,546 page views]
Perhaps "come at me bro" isn't the wisest course of action?
[view] [1,940 page views]
I suppose that's the prerogative of an original classification source.
[view] [2,288 page views]
Imagine getting to fully automate your global hacking endeavors!
[view] [21,496 page views]
It's almost too easy to fabricate fake videos now.
[view] [2,478 page views]
"No Touchbacks" only works on the playground apparently.
[view] [1,487 page views]
Think of it as a noisy TOR.
[view] [2,118 page views]
BLUF : It's not a good picture.
[view] [1,475 page views]
Is it really even worth trying to put authentication processes into software?
[view] [2,872 page views]