Tag Archives: sniffing

Social Engineering Fraud Losses Doubled in 2015

Consider the largest breaches of 2015 and realize they weren’t about getting financial data directly. It was all about personal details. Identity theft is a hotter commodity on the dark web, than credit card numbers. Anthem 80 million (Personal Details) Ashley … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , | Comments Off on Social Engineering Fraud Losses Doubled in 2015

Bypass Physical Security Using the Help of a Craigslist Job Ad

I spy, with my pi. A job ad was found on craigslist where some bad actors are hiring and paying up to $50/month to anyone who doesn’t adhere to their security policies and is willing to plug in a Raspberry … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Bypass Physical Security Using the Help of a Craigslist Job Ad

The Disgruntled and Passed Over

The FBI reports that; Michael Meneses, a system manager and software programmer who was often passed over for promotions, created a program to pharm employee passwords, left his job at an unnamed Long Island High-Voltage Power Manufacturer, in January 2012. After … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on The Disgruntled and Passed Over

Smartwatch to Smartphone Data Interception

Data sent between a Smartwatch and an Android smartphone could be a subject to brute force hacks to intercept and decode users’ data, including everything from text messages to Google Hangout chats and Facebook conversations. Liviu Arsene explains. Read more … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Smartwatch to Smartphone Data Interception

The Raspberry Pi: Impact on Hacking

So, this video is a little old, but very relevant. Sure the Raspberry Pi has been available for some time now, but has the awareness about them spread out of IT and into the minds of the business leaders? Are … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on The Raspberry Pi: Impact on Hacking

Hacker Drones Stealing your Info

Yet another video on attaching some hacking equipment to a drone. The mobile Internet devices such as phones, tablets, and laptops will always be in need of protection and honestly, the inventors can only do so much. Companies require administrative … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Hacker Drones Stealing your Info

Botnet Command and Control

James Lyne explains some botnet command and control.

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Botnet Command and Control

James Lyne on Warbiking San Francisco

Posted in Security Blog | Tagged , , , | Comments Off on James Lyne on Warbiking San Francisco

Breaking Wireless WPA2

You’ll need Backtrack with metasploit airmon-ng airodump-ng aireplay-ng aircrack Verify your wireless is up, airmon-ng start wlan0 airodump-ng mon0 Find a BSSID MAC address to become a toe (target of evaluation) Stop the program Gather the MAC address and Channel … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on Breaking Wireless WPA2

WireShark

Here is a video on using WireShark if you are new to it.

Posted in Security Blog | Tagged , , , , , , | Comments Off on WireShark