A Road Made From Silk and Onions

SILK ROAD (of history) The “silk road” of history was a group of trade routes that linked cultures and expanded civilizations by sharing ideas. It got its name from the effort to find good traveling routes for trading silk with China. But once the silk road routes were established, traders carried all manner of goods […]

New Bank Fraud Technique

We are all told to not give out our financial account access information to some stranger over the phone. We are told instead to initiate a call ourselves to our bank in order to ensure that we know to whom we are speaking. This new fraud technique appears to circumvent that advice. Beware the courier […]

Backdoor Meltdown

If the NSA has managed to inject backdoor access into most U.S. produced technology, they can win a victory in the intelligence war, but we the citizens may find it necessary to abandon some of the use of American technology ourselves. If we can make our enemies afraid that we can access their computers and […]

Cracking the Kryptos Code

In 1990, a sculpture named “Kryptos” (greek – hidden) was dedicated in a courtyard inside the Langley headquarters building of the CIA. The sculpture is made of large copper plates that display nearly 900 text characters. The characters are an encrypted message intended to be a challenge to cryptologists. CIA Releases Analyst’s Fascinating Tale of […]

Smart Meter Issues

A smart meter is a digital metering device used to measure public utility electric power consumption. They typically report their information via a wireless link every fifteen minutes or so. This allows the utility company to collect metering information without using human meter readers to manually observe the meter and to gain a more accurate […]

DHS Drone Hacked by Univ Texas

Our GPS satellite system puts out two sets of signals; one for our military, which is encrypted and highly accurate, and another signal for civilian use, which is not encrypted and is less accurate. Most domestic drones are currently using the unencrypted civilian signal set, which leaves them vulnerable to fairly simple spoofing attacks. By […]

Security Compliance Inspections Can Be Fun

Doing computer security compliance inspections involves a lot of work and is always interesting. Javvad Malik presents his own take on compliance inspections and mistakes in response to a list of mistakes from Tripwire. infosec mistakes – [] We all learn from our mistakes as we progress through our careers. Tripwire have compiled a list […]

Th3J35t3r – Lonewolf Hacker

The Jester Dynamic: A Lesson in Asymmetric Unmanaged Cyber Warfare – [] 2. Background On December 30, 2010, a patriot hacker posted a message to an Internet Chat Relay (IRC) Server. Quoting Steve Jobs, the hacker typed: “A small team of A players can run circles round a giant team of B and C players” […]

The Bluetooth Dilemma

This article describes how criminals have begun to integrate bluetooth technology into card reader skimmers to make it more effective for them to collect stolen card information. Josh Wright is an expert on bluetooth and wireless security in general and is a Senior Instructor at the SANS Institute, where he authored (and often teaches) the […]

US – Australia – Cyber Treaty

U.S., Australia to add cyber realm to defense treaty – [] (Reuters) – The United States and Australia will take the rare step on Thursday of declaring the cyber realm as part of a mutual defense treaty, meaning that a cyber attack on one could lead to a response by both nations. U.S.-Australia Ministerial Consultations […]