So, apparently Miss Teen USA’s computer got infected with a webcam-spying remote access trojan. So someone got some sneaky pictures of her, and tried to blackmail her. Fortunately, instead, she decided to talk about it. This is good. The majority of people don’t take computer security seriously enough. This could get some people talking, finally. […]
The Bradley Manning verdict came out this week, and the less I say about Manning himself the better, but one thing in the press coverage definitely bothered me, and I want to set that straight. The prosecution attempted to tie him to Julian Assange, saying he coached Manning on the use of “hacking tool wget.” […]
An article on Lifehacker this week explained a lot about how I initially became a computer professional. Its advice was to fly by the seat of your pants, try things without guidance or manuals, not be afraid to fail occasionally, and learn before you go to sleep. So when I spent many nights in my […]
I was listening to the excellent Risky Business analysis of the Droidpocalypse this week, and I’m happy to report that the vulnerability that affects 90% of Android devices ever made, while serious, is vastly overstated.
I saw this new headline regarding Edward Snowden, discussing his NSA hacking training. Don’t be impressed. For several years, I lived in that same world Snowden lived in. I’ve gone out of my way to avoid mentioning this, but from 2005-2012, I was a consultant. I worked for several different companies, due to contracts changing […]
I have zero intention of doing a mobile roundup every week, but it sure seems like there were a few noteworthy developments in the mobile field this week that are worth mentioning. So, here goes.
I’m reading the excellent Blackhatonomics right now. And one thing I read in it reminded me of a question that someone asked me last year. I was probably the third or fourth guy with an advanced security certification he’d met, and he asked me one day what it is that keeps us from turning criminal. […]
My tell-all about my encounter with “Computer Maintenance Department” was a little heavy on the jargon yesterday. It occurs to me that explaining what some of the terminology means, and the problem with their reasoning, may be helpful. I’ve also heard a few questions through various channels, and I think those are worth answering.
A wonderful NSA document called Untangling the Web, thanks to a FOIA request, is now available and free for all to download and use. Although dated, the book will prove highly useful. If you company or client is exposing data that it shouldn’t to the public Internet, this book will help you find it, so […]
So, “Peggy” from “Computer Maintenance Department” called me again last night. This time I decided to mess with him a bit more. This is the second time. (No, “Peggy” wasn’t his real name, nor did he identify himself as “Peggy,” but that’s the name I’ll use, thanks to that old Discover commercial.)