Category: hacks

cyber-juju email scam gangs of ghana

Here’s another security related video… this one about the intersection between hackers and black magic practitioners in the African nation of Ghana.   It is…

Continue Reading

video musings on the epsilon breach & malware

Each Tuesday morning, the New York Metro Infragard Members Alliance runs an excellent live webcast on all sorts of security topics from 9 AM –…

Continue Reading

trust on the internet takes (another) hit

SSL certificates are supposed to provide users with assurance that the sites they are browsing are legitimate. When you go to your online banking web…

Continue Reading

app stores and security

As personal handheld devices like smartphones and tablets become part of employees’ technical arsenals, the security of those devices begins to impact the corporate environment. …

Continue Reading

home made malware

Over the past few weeks I have been playing around with the Metasploit Framework, an open source software program which automates the process of using…

Continue Reading

gone in 6 minutes – your passwords

Apple’s iPhone and iPad have been phenomenally successful in the consumer sector and have been making inroads into the corporate world as well.  However, the iOS…

Continue Reading

it’s a printer! it’s a file system! it’s both!

You probably don’t give much thought to the printers on your network, at least from a security point of view.  Well, some recent research presented…

Continue Reading

malware in your pocket

2011 is looking to be the year when mobile malware comes into its own.  Why?  First off, the devices we carry in our pockets are…

Continue Reading

bus-ted

Back in May, I wrote about the Commonwealth of Massachusetts’  kick ass new data protection law, which looked like it could really encourage companies doing business…

Continue Reading

why hack when you can just ask?

At this past summer’s Def Con hacking convention, the folks at http://www.social-engineer.org decided to run a “Capture the Flag” competition to highlight the risks posed…

Continue Reading