Resources

Blog

DEF CON 24: Brainwashing Embedded Systems

Come get your hands dirty with embedded device hacks during my DEF CON 24 workshop. Brainwashing Embedded Systems will be held in Las Vegas Ballroom 3 on Saturday, August 6, from 10AM - 2PM. This workshop is a condensed version of the full-day training offered at the 2016 AusCERT and SecTor conferences. During the workshop, you will learn about the...
Blog

Challenges in Securing Unrestricted (Open) DNS Resolvers

Working for a security services vendor provides me the opportunity to work with a variety of cool tools in our quest to develop new and innovative security services. The most recent project I was deeply involved in is the development of a DNS security service called SecureSurf. The foundational goal of the design of this service was to provide a...
Blog

3 Principles and Challenges of Endpoint Discovery

Digital attackers are constantly looking for ways to infiltrate organizations' IT environments. One of the easiest modes of entry is for an actor to exploit a weakness in an endpoint, a network node which according to Dark Reading remains "the most attractive and soft soft target for cyber criminals and cyber espionage actors to get inside." Under...
Blog

Finding the Balance Between Security and Productivity

The majority of employees within an organisation are hired to execute specific jobs, such as marketing, managing projects, manufacturing goods and overseeing financial investments. Their main – sometimes only – priority is to efficiently complete their core business activity, so information security is usually only a secondary consideration....
Blog

Teenager Who DDoSed Governments, SeaWorld Receives No Jail Time

A teenager who launched distributed denial-of-service (DDoS) attacks against government websites and the SeaWorld theme park has received no prison time for his crimes. According to prosecutors, the teenager from Plymouth in Devon conducted a three-month attack spree from late-2014 to early-2015. During that time, the teen--who was 14 years old at...
Blog

Penetration Testing: Do We Need a New Term?

I am a penetration tester by trade. What does that mean I do in my day-to-day? Well, that depends on whom you ask, as it is open to interpretation. Penetration testing means different things to different people. What it meant a decade ago is different from what it means today, and that will be different from what it means a decade from now. So,...
Blog

Fraud and Computer Misuse Crime on the Rise, Study Finds

A new report from the Office for National Statistics (ONS) states that cybercrime is on the raise in England and Wales. According to the report, adults aged 16 and over experienced an estimated 5.8 million incidents in the past 12 months, with 3.8 million of those classified as fraud and another 2 million as computer misuse incidents. Regarding...
Blog

Kickass Torrents Goes Offline Following Arrest of Alleged Owner

One of the world's largest BitTorrent distribution sites Kickass Torrents (KAT) has gone offline following the arrest of its alleged owner. On July 20, kat.cr, which is the current domain for the website, appeared to be offline, reports Gizmodo. Those loading issues surfaced the same day U.S. authorities arrested Artem Vaulin, 30, of Kharkiv,...
Blog

Privacy and Humanity Elements for the IoT / IoE

In the first and second part of this series, we introduced the risks of the IoT / IoE world and addressed the mandatory security design considerations around the C-I-A triplet; the concepts of “openness;” the secure system and SDLC; the 4 “A”s; as well as the term “non-repudiation.” To continue with our overview, we will describe the important...
Blog

Cicis Pizza Suffers Payment Card Breach at 130+ Locations

Cicis Pizza, a casual fast food restaurant chain, has acknowledged it suffered a payment card breach at more than 130 locations. On July 19, the restaurant chain informed its customers of the breach: "Cicis values its customers and respects the privacy of your information. As a precautionary measure, we want to inform you that your personal...
Blog

Why Netflix Will Never Win in the Battle Against VPNs

One of the dominant tech stories of the year has been the Netflix crackdown on VPN users, and six months in, the story continues to rumble on. Despite widespread criticism, Netflix is still attempting to, slowly but surely, block access to its service from each and every VPN. To look at some of the media coverage of their activities, it would be...
Blog

Stampado Ransomware: A Lifetime License for a Low Price

In today's digital threat environment, the common computer criminal wants two things: money and safety. They want to get a high return on investment for their efforts, but they don't want to get caught. By meeting those two demands, a criminal ensures they have the resources and freedom necessary to plan out future attacks. These bad actors get what...
Blog

Lessons From Recent Hacks: Creating Strong Passwords

Breaches involving stolen credentials don’t surprise anyone these days. Those of us in infosec know too well that it’s a thousand times easier for the bad guys to gain access to a network and fly under the radar with a stolen login—often obtained through social engineering—than it is to get through cyber defenses. From the bad actors’ perspective,...
Blog

Ubuntu Forums Hack Exposed 2M Users' Information

A security breach at Ubuntu Forums exposed the information of as many as two million users. Jane Silber, CEO of Canonical, which is the company that produces the Debian-based Linux operating system Ubuntu, published a statement about the hack on Friday: "At 20:33 UTC on 14th July 2016, Canonical’s IS team were notified by a member of the Ubuntu...