web
analytics
Category

Security

Apple iPhone and iPod Touch Vulnerabilities

By | Security | No Comments


style=”display:inline-block;width:336px;height:280px”
data-ad-client=”ca-pub-1263642132905925″
data-ad-slot=”2110030350″>

iphone-broken-screen

Mobile devices are becoming smarter and more convenient.  The problem with that is they become targets.  And now that your data is mobile, theft is an issue.  But there is a more insiduous theft that can happen.  That’s because it can happen while you are holding the device and not even know the theft happened.

Read More

CSI Stick Grabs Cell Phone Data

By | Cell Phone, Hacking, Security | No Comments

csi-stick

Electronics forensics tools are an interesting group of utilities.  I usually find that forensics and security experts like them, but also a whole underground of hackers.  That’s because folks who love to learn and tinker like these kinds of tools.  Time to hide your cell phone!

Read More



style=”display:inline-block;width:200px;height:90px”
data-ad-client=”ca-pub-1263642132905925″
data-ad-slot=”6819431556″>

Buying An Outdoor Security Camera

By | Security | No Comments

outdoor-security-camera

Getting an outdoor security camera is a great idea, but there are potential issues when doing so.  Make sure you think through implementation before purchasing one of these.  Even home owners are starting to get into the act of putting an outdoor security camera in strategic locations to keep their families safe.

Read More



style=”display:inline-block;width:200px;height:90px”
data-ad-client=”ca-pub-1263642132905925″
data-ad-slot=”6819431556″>

Adobe Reader JBIG2 Critical Vulnerability

By | Security | No Comments

adobe-logo

A ton of people now use Adobe Reader. That’s because of the ease of use in cross platform document exchange. Well, a new zero day has surfaced that makes your reader like a giant hole in a bank. Various sources said that it was being actively exploited. Sure enough, I found source code out there for the exploit being circulated.

Read More

President Obama’s Helicopter Security P2P Breach

By | Industry News, Security, Whacky | No Comments

president-helicopter

Yeah, bizarre title.  Like something right out of a 24 episode.  Oh, and by the way, just how many moles can there be in CTU?  I mean seriously.  Is their security that lax?  Well, if it’s anything like our national security, the answer would be yes.  You see, peer to peer networks are great places to find all kinds of nasty little secrets.  One of them is social security numbers.  But how about the entire avionics for Obama’s helicopter?  Yeah, and that’s not the worst of it.

Read More

Apple Mac OS X Critical Security Patch

By | Security | No Comments

apple-mac-osx

It seems that Apple is really starting to gobble up market share.  That’s because exploitation of the OS is starting to pick up.  Yeah, some of these are standard development cycle fixes.  But hackers and crackers are starting to take aim at the growing market share.  I think Apple gobbled 5% more of the computer market last year.  That’s impressive.

Read More

Reveal Wifi Thieves

By | Hacking, Security, Wireless | No Comments

vultures.jpg

Wifi has really exploded.  Doing away with the wires is a really liberating experience.  Unfortunately, that freedom has come with a price.  Hopefully, you are NOT one of many people running an open wireless.  What I mean is, for the love of all that’s decent, please don’t tell me you have no encryption on your wireless signal!  That would be tantamount to allowing anyone and everyone into your private affairs.  And please don’t tell me you are stilll using WEP.  WEP is really insecure and can be cracked (even at high ecryption bits) very quickly.  I know because I’ve done it.  If you don’t encrypt your signal, you can still utilize the following tool – but please just enable encryption first.  That will go a long way to helping your issues.  But let’s say that your wireless signal seems to be crawling or slowed down a ton.  Maybe, just maybe, you have a wifi moocher on your hands.  Well, it just so happens that we can find out where those moochers are hiding!

Read More

Huge Bank of New York Mellon Security Breach

By | Security | No Comments

It’s one thing for a financial institution to have a data breach through hardened systems.  I understand that online and offline security is incredibly hard and complex.  I understand that it is a constant cat and mouse game to stay one step ahead of hackers and thieves.  What I don’t understand is when a data tape is not encrypted and then lost.  That’s plain laziness and a complete lack of concern for a company’s patrons’ security.

Read More