Monthly Archives: March 2014

Pablos Holman: Hacking Hardware to Kill Malaria

Well, among other things. This video is about hacking the future.

Posted in Security Blog | Tagged , , , | Comments Off on Pablos Holman: Hacking Hardware to Kill Malaria

Pablos Holman: Hacking RFID Credit Cards

RFID Credit Cards… After watching this, decide for yourself if you want or can get something more secure.

Posted in Security Blog | Tagged , , , | Comments Off on Pablos Holman: Hacking RFID Credit Cards

Information Security Awareness and Training Program

NIST Special Publication 800 – 50 is the National Institute of Standards and Technology’s guide on Building an Information Technology Security Awareness and Training Program. It can be found here http://csrc.nist.gov/publications/nistpubs/800-50/NIST-SP800-50.pdf 4.1.1 of this document is great for some ideas … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on Information Security Awareness and Training Program

KeyNotes: RSA Conference 2014

Posted in Security Blog | Tagged , , | Comments Off on KeyNotes: RSA Conference 2014

Dr. Susan Loveland: How to Hack a Website

Here are the tools that are in the video, like burp suite, etc… WebScarab Burp Suite Paros P.S. Top hats are cool. http://ha.ckers.org/xss.html https://www.carmelowalsh.com/2014/02/drone-hacking-skyjack/ https://www.carmelowalsh.com/2014/02/burp-suite/

Posted in Security Blog | Tagged , , , , , , | Comments Off on Dr. Susan Loveland: How to Hack a Website

Curiousity about RFID

This video makes me want to learn more about RFID. (Update. I posted a video about Pablos who knows exactly why. The post is here https://www.carmelowalsh.com/2014/03/pablos-holman-hacking-rfid-credit-cards/) Perhaps it is a case of security through obscurity? You might be able to … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Curiousity about RFID

Hacking: Movies vs. Real World

Posted in Security Blog | Tagged , , | Comments Off on Hacking: Movies vs. Real World

James Lyne on Warbiking San Francisco

Posted in Security Blog | Tagged , , , | Comments Off on James Lyne on Warbiking San Francisco

What’s the Risk?

When asked, what’s the risk? I find great pleasure in flexing my ability to break down potential loss in either qualitative or quantitative methods. The FAIR Quantitative Risk Model was taught to me by Jack Jones, the creator. I also … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on What’s the Risk?

TOR Mail

I’m sure people used TOR Mail because they thought they were completely anonymous. But there are side channel attacks, like asking France for a particular server.

Posted in Security Blog | Tagged , , , , | Comments Off on TOR Mail