Browsing All Posts filed under »Information Security«

A New Hope…

December 24, 2013 by

0

Dave Aitel has graciously allowed us to run his commentaries before – see Hackers May Help Choose The Next US President and Aitel On Cyberwar. Dave is the founder and Chief [Security|technology|executive][1] Officer of Immunity, Inc, and runs the Daily Dave mailing list, where this article was originally published. It is re-published here with his kind permission. So […]

Strikeback! Commission on IP Theft Report Gets All Ronin On China

May 23, 2013 by

0

A bipartisan group that studies the effects and impacts of IP theft in the US, The Commission on the Theft of American Intellectual Property, has released a report outlining their findings on the scope of the issue and making policy recommendations to combat it. The most interesting proposal among several: strikeback to re-capture stolen IP […]

We Don’t Got Your Back. We Got Your Money.

February 4, 2013 by

6

“We deal in deception here. What we do not deal with is self-deception.” - The Departed, written by William Monahan, Alan Mak and Felix Chong FADE IN. EXT. DAY. A WHEAT FIELD. BEES AND BUTTERFLIES FLUTTER. WE ZOOM IN ON A WOMAN IN A BUSINESS SUIT, HOLDING A TABLET COMPUTER. WOMAN: I used to worry […]

Onity Hotel-Room Lock-Hacking Triviality Becomes an Issue In Texas

November 28, 2012 by

1

Last July at the Black Hat conference, security researcher Cody Brocious gave a well-attended and much-discussed presentation in which he responsibly, totally reasonably and helpfully demonstrated the complete fail that is the Onity hotel door lock system. Now, I have skin in this game – I stay in hotels. A lot. So much so that, […]

II: Reports You Need To Read Now

October 24, 2012 by

3

Three reports you should be aware of – and not just because Dave and I are so busy with warrant work that we’ve had no time to do anything except point to the analysis of others – are covered in this report, and all are worth reading. The first big report, which we were in […]

Cyber-Criminal OPSEC – a Three-Part Series. Part III: TTTP

June 15, 2012 by

6

In Part I of this three-part series, we discussed the most basic of attribution methods, IP address analysis. In Part II, we talked about computer environmentals, and how it’s possible to build a device fingerprint based on what the user presents when they show up to a web server and ask for something and how […]

Follow

Get every new post delivered to your Inbox.

Join 850 other followers