Tag : Security
2010-10-03
Those charts showing cannot be broken without eons of calculations always fall apart when somebody says, "done!"
[view]
[2,181 page views]
2007-03-26
How do the modern operating system stack up against public vulnerability scans?
[view]
[153,164 page views]
2016-09-08
It's been 25 years since PGP was released and the software has quite the history being at odds with the US government.
[view]
[8,644 page views]
2007-10-23
The only thing more vulnerable to getting infected and used by everyone is your Mom.
[view]
[2,713 page views]
2005-09-22
The only way to not get logged these days ... is to not use your computer.
[view]
[2,998 page views]
2010-08-02
When your "always on" phone is spying on you ... game over man!
[view]
[2,001 page views]
2013-10-26
Thanks D-Link for the remote administration feature - I really wanted to make sure the random IT support guy from India could access my stuff.
[view]
[2,291 page views]
2013-08-01
In the wake of the Edward Snowden leaks against the NSA, it was interesting to be an audience member at both BlackHat and DEFCON in 2013.
[view]
[2,867 page views]
2013-08-14
Always use a VPN ... thought that wouldn't help from the cellular service point of view.
[view]
[2,348 page views]
2013-01-30
"I don't know my job" is not acceptable anywhere else in the military, why does cyber accept that in it's leadership ranks?
[view]
[1,966 page views]
2013-09-23
At least the technique doesn't require a bunch of severed thumbs.
[view]
[1,488 page views]
2011-12-14
Everything is an advertising/marketing/intelligence sensor - including your cell phone.
[view]
[1,760 page views]
2011-11-21
Are there really people that still believe US adversaries aren't taking advantage of the US?
[view]
[2,986 page views]
2008-01-28
This doesn't bode well for the future stability of the American power grid.
[view]
[3,919 page views]
2007-05-04
As long as it's not discovered publicly and revenue isn't lost, they don't care.
[view]
[6,668 page views]
2015-09-02
When China steals your data ... and your solution is to then give your data to them willingly to protect ... you might work for the US government.
[view]
[3,688 page views]
2012-08-17
Now your computer can have a digital "Enron Shredding Party", too.
[view]
[1,886 page views]
2019-05-24
As if the Internet wasn't already untrustworthy, it's becoming too easy to fabricate everything.
[view]
[1,797 page views]
2019-12-21
Without a "Battle Damage Assessment," you'll have no idea if its working.
[view]
[3,340 page views]
2011-01-05
For 18 minutes in 2010, a BGP anomaly resulted in nearly 15% of the Internet's traffic being routed through China. What really happened?
[view]
[5,903 page views]
2008-11-29
Everything you do leaves a trace, whether in meatspace or cyberspace.
[view]
[2,879 page views]
2018-04-17
Tired of social media sites harvesting your personal information and contact circles?
[view]
[3,104 page views]
2015-01-05
So basically, wear gloves, sunglasses, a hat ... and never go outside.
[view]
[1,570 page views]
2008-03-12
Many people forget how legacy hardware technologies can be used to completely bypass software controls.
[view]
[6,986 page views]
2011-12-05
All these interconnected things literally NEVER get security updates.
[view]
[1,831 page views]
2015-02-13
Just need a magnetic stripe programmer and an anonymous server for the pumps to beacon out to ...
[view]
[3,434 page views]
2011-06-06
... because password cracking iss such a gateway drug to hacking.
[view]
[1,985 page views]
2018-03-16
Obviously the public WiFi point should be yours ... get rid of the other pesky users to speed up your connection.
[view]
[4,191 page views]
2013-10-17
IRCd-Hybrid does not have SSL enabled and requires some workarounds to secure its connections. This tutorial will get an IRCd-Hybrid server running, linked to other servers, and secured with SSL.
[view]
[18,317 page views]
2017-01-27
Your Amazon Echo is always connected and allegedly always listening ... what network traffic is it generating?
[view]
[11,466 page views]
2011-11-05
More than merely cut 'n paste, this tool ensures light direction, shadows, reflections, etc. are all accounted for.
[view]
[3,876 page views]
2012-04-27
Why are manufacturers of "smart" home electronics making them openly visible on the Internet?
[view]
[3,455 page views]
2013-04-06
It's almost like the movies ... where the thieves have a hacker that can reroute all the traffic to facilitate their getaway.
[view]
[1,952 page views]
2010-05-12
Hackers are ever so clever in skirting past security mechanisms.
[view]
[2,355 page views]
2007-10-26
Botnets are lovely pieces of software for studying program survivability.
[view]
[4,048 page views]
2004-08-30
I felt like vulnerability scanning various common operating systems and hardware I had lying around to see what the likelihood was of getting script p0wn'd.
[view]
[18,988 page views]
2006-03-31
You never know who is actually reading your content. On OmniNerd, the content posted by the site's users actually attracted a posting by terrorist sympathizers.
[view]
[11,980 page views]
2008-01-14
Everyone wants privacy until it protects pedophiles and terrorists.
[view]
[3,008 page views]
2005-11-21
A rootkit is the apex of modern malware, eclipsing both viruses and worms, yet their function are the least publicly understood.
[view]
[55,687 page views]
2010-02-27
There will never be security when a culture of insecurity exists.
[view]
[1,999 page views]
2010-03-10
I received a phishing e-mail one day and decided to take a look into just how those attacks do their deed. With a few simple tools, its possible to derive a lot of information using only static analysis against malware.
[view]
[18,307 page views]
2010-03-23
The ones who suck at literally everything, aren't faring so well at protecting their data.
[view]
[2,095 page views]
2016-04-07
Considering how much the public wants gun violence suppressed, crippling law enforcement's ability to infiltrate criminal plans seems misguided.
[view]
[1,777 page views]
2007-12-07
Ten years from now, what other obvious security vulnerability will we smack our foreheads over?
[view]
[3,106 page views]
2005-11-10
Using other people's failures to your advantage is the mantra of Computer Science.
[view]
[3,652 page views]
2019-06-30
Self driving cars should make things safer by taking unreliable human drivers out of the mix - unless we mess with them.
[view]
[1,813 page views]
2011-03-25
Centralized trust is great until the trusted party screws it all up.
[view]
[1,936 page views]
2007-04-30
It doesn't take a strong RF signal anymore to enable a TEMPEST attack.
[view]
[9,572 page views]
2012-06-05
I suppose that's the prerogative of an original classification source.
[view]
[2,762 page views]
2006-11-01
Imagine getting to fully automate your global hacking endeavors!
[view]
[21,813 page views]
2008-03-06
Is it really even worth trying to put authentication processes into software?
[view]
[3,102 page views]