Tag Archives: 2014

Privacy Comic: The Phone Book

It wasn’t that long ago that if you wanted to find somebody, you just looked in the phone book. It’s a little more evolved now.

Posted in Security Blog | Tagged , | Comments Off on Privacy Comic: The Phone Book

Conmen Evolved

Unless you are completely off the grid and don’t even read newspapers, it is hard to avoid the data breaches announced in the news. It’s not just techie news anymore either, with the big named news shows on the television … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Conmen Evolved

Marine Corps Birthday Message 2014

Happy birthday my brothers and sisters!

Posted in Security Blog | Tagged , , | Comments Off on Marine Corps Birthday Message 2014

The Postal Service Suffered a Cybersecurity Breach

The data of 800,000 people potentially compromised for employee and customer personal information, including addresses, Social Security numbers and emails. The USPS is working with the FBI, Justice Department and the U.S. Computer Emergency Readiness Team to investigate the breach. … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on The Postal Service Suffered a Cybersecurity Breach

Operation Onymous… 414 Onion sites Taken Offline/Seized

Tor (The Onion Router) is an anonymizing program that allows access to the Dark Web, it works by basically routing packets through an anonymous proxy network. (See Searching the Deep Web) Europol, the FBI, and the Department of Homeland Security, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Operation Onymous… 414 Onion sites Taken Offline/Seized

Brain-to-Brain Communication Over the Internet

Wow, that’s cool! I would like to coin the phrase “Cybernotic Suggestion” for when brain-to-brain communication over the Internet is subject to a man-in-the-middle attack and the receiving end of the mind comm. gets suggested brain waves.

Posted in Security Blog | Tagged , , , , , , | Comments Off on Brain-to-Brain Communication Over the Internet

Remember, Remember, The 5th of November

Anonymous is a truth movement advocating hacktivism as self-defense for unconstitutional government. It is our aim to shed light on corrupt government in order to set people free from oppression. Read more about the Million Mask March. Guy Fawkes is … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Remember, Remember, The 5th of November

Contactless Payment Cards Will Approve Foreign Currency Transactions of up to 999,999.99

“With just a mobile phone we created a POS terminal that could read a card through a wallet,” explains Martin Emms, from the NewCastle University research team during the 2014 ACM CCS Conference held in the city of Scottsdale, Arizona, … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Contactless Payment Cards Will Approve Foreign Currency Transactions of up to 999,999.99

OS X 10.10 rootpipe

rootpipe, a privilege escalation vulnerability in OS X version 10.10, allows attackers to completely bypass logging in and gaining the highest administration privilege on a Mac. To protect against it, create a new admin user and remove the admin rights … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on OS X 10.10 rootpipe

AirHopper. Keylogging Disconnected Computers.

AirHopper demonstrates how textual and binary data can be ex-filtrated from physically an isolated computer to mobile phones at a distance of 1-7 meters, with effective bandwidth of 13 to 60 bps. Enough to steal a password. The technology works … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on AirHopper. Keylogging Disconnected Computers.