Tag Archives: hacked

Nude Celebs (The Fappening) !!! and Password Recovery

Nude Jennifer Lawrence… Sorta. Apple says that the mass theft of nude celebrity photos (Dubbed, the Fappening) that were released over the weekend did not occur because of a breach in any Apple systems, including iCloud. Apple also says that … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Nude Celebs (The Fappening) !!! and Password Recovery

Mid-year 2014 Data Breaches Exposed

2014 is going to replace 2013 as the highest year on record for exposed records, according to Risk Based Security. Mid-year 2014 at a Glance … • There were 1331 incidents reported during the first six months of 2014 exposing … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , | Comments Off on Mid-year 2014 Data Breaches Exposed

The CyberVors

A Russian cyber gang over the past several months has breached over 420,000 web and FTP sites to pilfer over 1.2 billion credentials. They are known as the CyberVors (Vors is thief in Russian). They used botnets to scan hundreds … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on The CyberVors

More James Lyne, Anatomy of an Attack

I really like how passionate James Lyne is about his field. It was a presentation very similar to this that got me intrigued into the security field. It was a Cisco security conference in Tucson where the presenter hacked a … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on More James Lyne, Anatomy of an Attack

Lights, Camera, Hacktion

A vulnerability was found by some white-hat hackers who researched how to obtain the wifi passwords of homes that had super cool lights that could be turned on, off, or dimmed by an app on a phone (both IOS and … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Lights, Camera, Hacktion

Smart TV Hacking

@beist from Korea. TVs are never really off, are they? Here are his slides (pdf).

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Smart TV Hacking

Quadcopter with Machine Guns

A big goal of security is to safeguard human lives. What if wars of the future are thousands of these? What if they are autonomous? Worse, what if they are susceptible to skyjacking, as Samy Kamkar demonstrates here? The future … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Quadcopter with Machine Guns

Gary Warner on TedxBirmingham: Why do we call it CyberCrime?

What is cybercrime? How do we fight cybercrime? Who do we report cybercrime to? Gary Warner tells us his thoughts.

Posted in Security Blog | Tagged , , , , , | Comments Off on Gary Warner on TedxBirmingham: Why do we call it CyberCrime?

Six Failures of Target’s Non-Compliance

Ira Winkler, is very well known champion in the security arena who is super busy and he still found time to write this article on ComputerWorld in regards to the 6 Failures of Target. To summarize the article, basically, there … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Six Failures of Target’s Non-Compliance

Albert Gonzalez

It’s hard not to be a little envious of the amazing technical skills and charismatic charm of Albert Gonzalez. Then again, I’m glad I haven’t done anything as crazy and super happy to not be serving a 20 year sentence. … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on Albert Gonzalez