Category: hacks
The (not paranoid enough) Android
The train wreck that is Android security continues… A new strain of malware by security firm Wandera found in China has the following charming characteristics,…
Beware of mobile number port out scams!
I spend a lot of time telling people to use two factor authentication on their important web accounts. This may explain why I don’t get…
The ultimate outsider threat?
I know I have been blathering on about insider threats lately, so let’s go to the other extreme – the ultimate outsider threat. A pair…
Insiders on the outside
Homeland Security Magazine has a very interesting case study on an insider threat case involving DirecTV. In this case, the insider was a sort-of third…
Leaky buckets and acquisition best practices
There are three interesting things for CSOs to think about in this story on a leak of passport and other personal information on tens of…
The other big hack of 2016?
According to CSO Online, someone is offering for sale what they claim is a 6GB file of “data enrichment” information pertaining to over 200 million…
malware strikes non jailbroken iOS devices
A reminder that while iOS still seems to be safer from malware threats (as long as you don’t jailbreak your device), Apple’s walled garden is…
No, you don’t need to close your LastPass account…
Yesterday, at ShmooCon, security researcher Sean Cassidy announced a vulnerability in the popular LastPass password manager. He demonstrated a way that an attacker could send…
In DPRK, Linux Watches You
A presentation from this past week’s Chaos Computer Congress shows how totalitarian states (like, in this case, North Korea) can leverage open source software in…
quick and dirty malware analysis
There are a number of web based tools that allow you to safely analyze the behavior of potentially malicious files safely. My personal favorite is…