WEP Cracking Cheatsheet
This is nothing new and most of the attack detail comes from the excellent Hacking Exposed: Wireless Second Edition, I just wanted a quick reference sheet for the commands to crack a WEP network. I’m...
View ArticleBlack Friday: Security team warns against malicious iTunes emails
Here’s a note of caution for all those bargain hunters presently slavering at the prospect of securing some tasty Black Friday deals: A team of vigilant security experts in Germany are today advising...
View Articlejournald log hash chaining is broken
I promised to dig into some of the details of the journald announcement. One of the most hyped features is log hash chaining. Lennart describes this in his paper as follows (highlighting by me): The...
View ArticleVerizon Galaxy Nexus LTE release date rumor:
Verizon Galaxy Nexus LTE release date rumor: Nov 29#tlv Verizon Galaxy Nexus LTE release date rumor: Nov 29
View ArticleWill the UK Cyber Security Strategy make a difference?
The British government has today published its Cyber Security Strategy detailing how it plans to protect national security and the public from internet threats, and (hopefully) support the British...
View ArticleProtecting Kids Online
Image via Wikipedia One of the issues I’ve been struggling with over the past ten or so years is how to protect kids online. The Internet offers a world of opportunities. People of all ages share...
View ArticleTwelve days of Phishmas – 2011
Phishers are thankful for how generous so many Internet users have been in 2011. As they did in 2009 and 2010, carolers are filling IRC channels with the merry sounds of Phishmas anew! Photo by Lucci...
View ArticleLevitator: Root on your Android phone
A few days ago, Jon Larimer and Jon Oberheide published a vulnerability for Android platforms < 2.3.6. David Maciejak and I were curious to run it on an Android phone. Result: it runs perfectly :(...
View ArticleAnother graph of an elliptic curve
After playing with the graphing program on my son's iPad for a while, I tried using it to plot a few 3-dimensional graphs. The first thing that I tried was to look at the elliptic curve y2 = x3 - 2x +2...
View ArticleProbabilistically, Not.
Conveyed to my overtaxed attention, via BoingBoing’s Maggie Koerth-Baker comes, likely, the most succinct, self-referencing abstract within any specific scholarly paper I have examined [evidently,...
View ArticleNitrozac and Snaggy: Guess Who’s Coming For Dinner
Tech humor from Nitrozac and Snaggy at The Joy of Tech™
View Article13 million MapleStory players at risk after hack – casting a cloud over...
If you're about to float your video game company on the stock exchange, probably the last thing you want is for a hacker to break into the personal details of some 13 million of your players.
View ArticleSousveillance, Media and Strategic Political Communication: Iraq, USA, UK
Until I got a copy of Sousveillance, Media and Strategic Political Communication: Iraq, USA, UK, I have never heard of the term sousveillance. It is defined as both the recording of an activity by a...
View ArticleWhat I don’t like about journald / Linux Journal
I heard of journald only a couple of hours ago (Tuesday?) and since then some intense discussion is going on. I had a chance to look at the journald material in more depth. I also had a quick look at...
View ArticleDo I need to hit ‘Cancel’ to not cancel?
Do I need to hit 'Cancel' to not cancel? And where is the 'Yes' button?Source: http://thedailywtf.com/Articles/X-Marks-the-Close.aspx (#4)
View ArticleXSS Deep Dive
While on the topic of research papers, I came across another interesting paper on the UC Berkely web site while checking the reference for the effect of development tools on security. Joel Weinberger,...
View ArticleJob: Security Engineer II in Fairfax, VA
Looks like a great job opportunity has turned up over at the NoVA Hackers Association’s facility host. I know several of the folks that work in their security department over there and it seems like...
View ArticleSSCC 77 – Thanksgiving patching, SCADA, Google WiFi mapping and Android security
Paul Ducklin joins Chet to talk about this week's news including giving your friends and family a hand at Thanksgiving, Android security, SCADA hacking and Google's WiFi mapping opt-out scheme.
View ArticleSafeguards for ethical hackers spurned by Australian government
The Australian government has thumbed its nose at legal safeguards for ethical hackers, according to security researcher Alana Maurushat. industry professionals say they went out of their way to submit...
View ArticleSpam attack hits Facebook’s own Help Center
Spammers use the Thanksgiving holiday as an opportunity to swamp Facebook's own Help Center with spam messages.
View Article