Support the Blog


My Favorite’s

Apple’s Thumbscan and Your Security

If Apple allows you to add the thumbscan to the access requirement in conjunction with a passphrase then this is moot and I would say go for it. Yes, there’s no doubt that your biometric data may be compromised. If you can live with that possibility then let’s look at another potential problem. If you […]

Eavesdropping Antennas Can Steal Your Secrets

“At the RSA computer security conference last week, Gary Kenworthy of Cryptography Research held up an iPod Touch on stage and looked over to a TV antenna three meters away. The signal picked up by the antenna, routed through an amplifier and computer software, revealed the secret key being used by an app running on […]

OWS Hackers Reveal Thousands of Cops’ Personal Data

Computer hackers are avenging the Occupy movement by exposing the personal information of police officers who evicted protesters and threatening family-values advocates who led a boycott of an American Muslim television show. In three Internet postings last week, hackers from the loose online coalition called Anonymous published the email and physical addresses, phone numbers and, […]

10 scariest hacks from Black Hat and Defcon

Hack week in Vegas during the Black Hat and Defcon conferences in Las Vegas last week, researchers wheeled out their best new attacks on everything from browsers to automobiles, demonstrating ingenuity and diligence in circumventing security efforts or in some cases in exploiting systems that were built without security in mind. Here’s a handful of […]

Zombie cookies’ won’t die: Microsoft admits use, HTML5 looms as new vector

Despite lawsuits, bad publicity, and Adobe’s promise to end their use in Flash, zombie cookies persist and could find a new host in HTML5

Read More

China airs documentary proving military university is hacking U.S. targets

For a long time now there has been suspicion that China is a hotbed of hacking activity either endorsed or ignored by the government and targeting foreign individuals, companies, and even governments. The Chinese government has always denied this, but high-profile pull outs such as that threatened by Google last year, demonstrate there is definitely […]

How the FBI investigates the hacktivities of Anonymous

On September 19, 2008, hackers from the Anonymous collective attacked the website of Fox News host Bill O’Reilly. The hackers found and immediately posted e-mail addresses, passwords, and physical addresses of 205 O’Reilly site members paying $5 a month to hear Bill’s wisdom. The next day, a distributed denial of service (DDoS) attack hit the […]

Stealing ATM PINs with thermal cameras

At the USENIX Security Symposium last week, researchers Keaton Mowery, Sarah Meiklejohn and Stefan Savage from the University of California at San Diego presented their paper “Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks.”

Read More

Hacker to Demonstrate ‘Weak’ Mobile Internet Security

A German computer engineer said Tuesday that he had deciphered the code used to encrypt most of the world’s mobile Internet traffic and that he planned to publish a guide to prompt global operators to improve their safeguards.

Read More

A Look Into the iPhone FaceTime Glitch Claims

There have been many articles on the web this week suggesting that Apple’s iPhone 4 could be secretly taking pictures of users. I would like to look into these claims and use a little common sense to see if any of this actually makes sense, or if it’s some kind of misunderstanding or joke.

The […]

IE8 on Windows 7 hijacked with 3 vulnerabilities

Using three different vulnerabilities and clever exploitation techniques, Irish security researcher Stephen Fewer successfully hacked into a 64-bit Windows 7 (SP1) running Internet Explorer 8 to win this year’s CanSecWest hacker challenge. Fewer (right), a Metasploit developer who specializes in writing Windows exploits, used two different zero-day bugs in IE to get reliable code execution […]