Tag : Security
2010-10-03
Those charts showing cannot be broken without eons of calculations always fall apart when somebody says, "done!"
[view]
[2,127 page views]
2007-03-26
How do the modern operating system stack up against public vulnerability scans?
[view]
[153,076 page views]
2016-09-08
It's been 25 years since PGP was released and the software has quite the history being at odds with the US government.
[view]
[8,593 page views]
2007-10-23
The only thing more vulnerable to getting infected and used by everyone is your Mom.
[view]
[2,677 page views]
2005-09-22
The only way to not get logged these days ... is to not use your computer.
[view]
[2,969 page views]
2010-08-02
When your "always on" phone is spying on you ... game over man!
[view]
[1,980 page views]
2013-10-26
Thanks D-Link for the remote administration feature - I really wanted to make sure the random IT support guy from India could access my stuff.
[view]
[2,241 page views]
2013-08-01
In the wake of the Edward Snowden leaks against the NSA, it was interesting to be an audience member at both BlackHat and DEFCON in 2013.
[view]
[2,829 page views]
2013-08-14
Always use a VPN ... thought that wouldn't help from the cellular service point of view.
[view]
[2,305 page views]
2013-01-30
"I don't know my job" is not acceptable anywhere else in the military, why does cyber accept that in it's leadership ranks?
[view]
[1,921 page views]
2013-09-23
At least the technique doesn't require a bunch of severed thumbs.
[view]
[1,456 page views]
2011-12-14
Everything is an advertising/marketing/intelligence sensor - including your cell phone.
[view]
[1,713 page views]
2011-11-21
Are there really people that still believe US adversaries aren't taking advantage of the US?
[view]
[2,936 page views]
2008-01-28
This doesn't bode well for the future stability of the American power grid.
[view]
[3,872 page views]
2007-05-04
As long as it's not discovered publicly and revenue isn't lost, they don't care.
[view]
[6,625 page views]
2015-09-02
When China steals your data ... and your solution is to then give your data to them willingly to protect ... you might work for the US government.
[view]
[3,599 page views]
2012-08-17
Now your computer can have a digital "Enron Shredding Party", too.
[view]
[1,842 page views]
2019-05-24
As if the Internet wasn't already untrustworthy, it's becoming too easy to fabricate everything.
[view]
[1,757 page views]
2019-12-21
Without a "Battle Damage Assessment," you'll have no idea if its working.
[view]
[3,271 page views]
2011-01-05
For 18 minutes in 2010, a BGP anomaly resulted in nearly 15% of the Internet's traffic being routed through China. What really happened?
[view]
[5,858 page views]
2008-11-29
Everything you do leaves a trace, whether in meatspace or cyberspace.
[view]
[2,841 page views]
2018-04-17
Tired of social media sites harvesting your personal information and contact circles?
[view]
[3,052 page views]
2015-01-05
So basically, wear gloves, sunglasses, a hat ... and never go outside.
[view]
[1,534 page views]
2008-03-12
Many people forget how legacy hardware technologies can be used to completely bypass software controls.
[view]
[6,926 page views]
2011-12-05
All these interconnected things literally NEVER get security updates.
[view]
[1,789 page views]
2015-02-13
Just need a magnetic stripe programmer and an anonymous server for the pumps to beacon out to ...
[view]
[3,361 page views]
2011-06-06
... because password cracking iss such a gateway drug to hacking.
[view]
[1,935 page views]
2018-03-16
Obviously the public WiFi point should be yours ... get rid of the other pesky users to speed up your connection.
[view]
[4,129 page views]
2013-10-17
IRCd-Hybrid does not have SSL enabled and requires some workarounds to secure its connections. This tutorial will get an IRCd-Hybrid server running, linked to other servers, and secured with SSL.
[view]
[18,240 page views]
2017-01-27
Your Amazon Echo is always connected and allegedly always listening ... what network traffic is it generating?
[view]
[11,325 page views]
2011-11-05
More than merely cut 'n paste, this tool ensures light direction, shadows, reflections, etc. are all accounted for.
[view]
[3,804 page views]
2012-04-27
Why are manufacturers of "smart" home electronics making them openly visible on the Internet?
[view]
[3,393 page views]
2013-04-06
It's almost like the movies ... where the thieves have a hacker that can reroute all the traffic to facilitate their getaway.
[view]
[1,907 page views]
2010-05-12
Hackers are ever so clever in skirting past security mechanisms.
[view]
[2,315 page views]
2007-10-26
Botnets are lovely pieces of software for studying program survivability.
[view]
[4,014 page views]
2004-08-30
I felt like vulnerability scanning various common operating systems and hardware I had lying around to see what the likelihood was of getting script p0wn'd.
[view]
[18,934 page views]
2006-03-31
You never know who is actually reading your content. On OmniNerd, the content posted by the site's users actually attracted a posting by terrorist sympathizers.
[view]
[11,927 page views]
2008-01-14
Everyone wants privacy until it protects pedophiles and terrorists.
[view]
[2,976 page views]
2005-11-21
A rootkit is the apex of modern malware, eclipsing both viruses and worms, yet their function are the least publicly understood.
[view]
[55,569 page views]
2010-02-27
There will never be security when a culture of insecurity exists.
[view]
[1,952 page views]
2010-03-10
I received a phishing e-mail one day and decided to take a look into just how those attacks do their deed. With a few simple tools, its possible to derive a lot of information using only static analysis against malware.
[view]
[18,235 page views]
2010-03-23
The ones who suck at literally everything, aren't faring so well at protecting their data.
[view]
[2,049 page views]
2016-04-07
Considering how much the public wants gun violence suppressed, crippling law enforcement's ability to infiltrate criminal plans seems misguided.
[view]
[1,742 page views]
2007-12-07
Ten years from now, what other obvious security vulnerability will we smack our foreheads over?
[view]
[3,065 page views]
2005-11-10
Using other people's failures to your advantage is the mantra of Computer Science.
[view]
[3,593 page views]
2019-06-30
Self driving cars should make things safer by taking unreliable human drivers out of the mix - unless we mess with them.
[view]
[1,773 page views]
2011-03-25
Centralized trust is great until the trusted party screws it all up.
[view]
[1,893 page views]
2007-04-30
It doesn't take a strong RF signal anymore to enable a TEMPEST attack.
[view]
[9,502 page views]
2012-06-05
I suppose that's the prerogative of an original classification source.
[view]
[2,702 page views]
2006-11-01
Imagine getting to fully automate your global hacking endeavors!
[view]
[21,754 page views]
2008-03-06
Is it really even worth trying to put authentication processes into software?
[view]
[3,063 page views]