Tag : Security
2010-10-03
Those charts showing cannot be broken without eons of calculations always fall apart when somebody says, "done!"
[view]
[2,257 page views]
2007-03-26
How do the modern operating system stack up against public vulnerability scans?
[view]
[153,443 page views]
2016-09-08
It's been 25 years since PGP was released and the software has quite the history being at odds with the US government.
[view]
[8,732 page views]
2007-10-23
The only thing more vulnerable to getting infected and used by everyone is your Mom.
[view]
[2,771 page views]
2005-09-22
The only way to not get logged these days ... is to not use your computer.
[view]
[3,077 page views]
2010-08-02
When your "always on" phone is spying on you ... game over man!
[view]
[2,062 page views]
2013-10-26
Thanks D-Link for the remote administration feature - I really wanted to make sure the random IT support guy from India could access my stuff.
[view]
[2,396 page views]
2013-08-01
In the wake of the Edward Snowden leaks against the NSA, it was interesting to be an audience member at both BlackHat and DEFCON in 2013.
[view]
[2,935 page views]
2013-08-14
Always use a VPN ... thought that wouldn't help from the cellular service point of view.
[view]
[2,443 page views]
2013-01-30
"I don't know my job" is not acceptable anywhere else in the military, why does cyber accept that in it's leadership ranks?
[view]
[2,030 page views]
2013-09-23
At least the technique doesn't require a bunch of severed thumbs.
[view]
[1,558 page views]
2011-12-14
Everything is an advertising/marketing/intelligence sensor - including your cell phone.
[view]
[1,838 page views]
2011-11-21
Are there really people that still believe US adversaries aren't taking advantage of the US?
[view]
[3,127 page views]
2008-01-28
This doesn't bode well for the future stability of the American power grid.
[view]
[3,994 page views]
2007-05-04
As long as it's not discovered publicly and revenue isn't lost, they don't care.
[view]
[6,739 page views]
2015-09-02
When China steals your data ... and your solution is to then give your data to them willingly to protect ... you might work for the US government.
[view]
[3,787 page views]
2012-08-17
Now your computer can have a digital "Enron Shredding Party", too.
[view]
[1,954 page views]
2019-05-24
As if the Internet wasn't already untrustworthy, it's becoming too easy to fabricate everything.
[view]
[1,876 page views]
2019-12-21
Without a "Battle Damage Assessment," you'll have no idea if its working.
[view]
[3,470 page views]
2011-01-05
For 18 minutes in 2010, a BGP anomaly resulted in nearly 15% of the Internet's traffic being routed through China. What really happened?
[view]
[6,159 page views]
2008-11-29
Everything you do leaves a trace, whether in meatspace or cyberspace.
[view]
[2,948 page views]
2018-04-17
Tired of social media sites harvesting your personal information and contact circles?
[view]
[3,176 page views]
2015-01-05
So basically, wear gloves, sunglasses, a hat ... and never go outside.
[view]
[1,635 page views]
2008-03-12
Many people forget how legacy hardware technologies can be used to completely bypass software controls.
[view]
[7,150 page views]
2011-12-05
All these interconnected things literally NEVER get security updates.
[view]
[1,891 page views]
2015-02-13
Just need a magnetic stripe programmer and an anonymous server for the pumps to beacon out to ...
[view]
[3,584 page views]
2011-06-06
... because password cracking is such a gateway drug to hacking.
[view]
[2,057 page views]
2018-03-16
Obviously the public WiFi point should be yours ... get rid of the other pesky users to speed up your connection.
[view]
[4,319 page views]
2013-10-17
IRCd-Hybrid does not have SSL enabled and requires some workarounds to secure its connections. This tutorial will get an IRCd-Hybrid server running, linked to other servers, and secured with SSL.
[view]
[18,474 page views]
2017-01-27
Your Amazon Echo is always connected and allegedly always listening ... what network traffic is it generating?
[view]
[11,655 page views]
2011-11-05
More than merely cut 'n paste, this tool ensures light direction, shadows, reflections, etc. are all accounted for.
[view]
[3,995 page views]
2012-04-27
Why are manufacturers of "smart" home electronics making them openly visible on the Internet?
[view]
[3,563 page views]
2013-04-06
It's almost like the movies ... where the thieves have a hacker that can reroute all the traffic to facilitate their getaway.
[view]
[2,024 page views]
2010-05-12
Hackers are ever so clever in skirting past security mechanisms.
[view]
[2,437 page views]
2007-10-26
Botnets are lovely pieces of software for studying program survivability.
[view]
[4,165 page views]
2004-08-30
I felt like vulnerability scanning various common operating systems and hardware I had lying around to see what the likelihood was of getting script p0wn'd.
[view]
[19,098 page views]
2006-03-31
You never know who is actually reading your content. On OmniNerd, the content posted by the site's users actually attracted a posting by terrorist sympathizers.
[view]
[12,074 page views]
2008-01-14
Everyone wants privacy until it protects pedophiles and terrorists.
[view]
[3,062 page views]
2005-11-21
A rootkit is the apex of modern malware, eclipsing both viruses and worms, yet their function are the least publicly understood.
[view]
[56,015 page views]
2010-02-27
There will never be security when a culture of insecurity exists.
[view]
[2,076 page views]
2010-03-10
I received a phishing e-mail one day and decided to take a look into just how those attacks do their deed. With a few simple tools, its possible to derive a lot of information using only static analysis against malware.
[view]
[18,537 page views]
2010-03-23
The ones who suck at literally everything, aren't faring so well at protecting their data.
[view]
[2,167 page views]
2016-04-07
Considering how much the public wants gun violence suppressed, crippling law enforcement's ability to infiltrate criminal plans seems misguided.
[view]
[1,846 page views]
2007-12-07
Ten years from now, what other obvious security vulnerability will we smack our foreheads over?
[view]
[3,167 page views]
2005-11-10
Using other people's failures to your advantage is the mantra of Computer Science.
[view]
[3,732 page views]
2019-06-30
Self driving cars should make things safer by taking unreliable human drivers out of the mix - unless we mess with them.
[view]
[1,879 page views]
2011-03-25
Centralized trust is great until the trusted party screws it all up.
[view]
[1,997 page views]
2007-04-30
It doesn't take a strong RF signal anymore to enable a TEMPEST attack.
[view]
[9,688 page views]
2012-06-05
I suppose that's the prerogative of an original classification source.
[view]
[2,941 page views]
2006-11-01
Imagine getting to fully automate your global hacking endeavors!
[view]
[21,899 page views]
2008-03-06
Is it really even worth trying to put authentication processes into software?
[view]
[3,179 page views]