ARCHIVED BLOG POSTS
2010
10
Comments
0 5 Sneaky Credit Card Scams Published: Oct 15, 2010 - Edit this #1 Phone Fraud. The phone rings, a scammer poses as your banks fraud department. They may have your entire card number stolen from another source. They ask about a charge made and you deny the charge, but in order for the charge to...
10/26/2010
1
Comments
Sometimes all you can do is shake your head and wonder how we have managed to get this far as a species. Scanning today’s paper I couldn’t help but notice the total mayhem that makes up one day of news. I bring this to your attention not to sensationalize or provide the “bad news” but to make yo...
10/26/2010
4
Comments
As mobile Internet usage continues its rapid growth, cyber criminals are expected to pay more attention to this sector. Mobile device platforms compete for content creators’ latest innovations, which often require more and more device access. As applications and other content are more widely dis...
10/23/2010
0
Comments
Pete Herzog, Founder of ISECOM, will be discussing the revised Open Source Security Testing Methodology Manual (OSSTMM v3) and how it applies to web application security today (10-13-2010) in Raleigh, NC. Pete rarely gets to the US, so this is a unique opportunity for security professionals to h...
10/23/2010
0
Comments
Being on top of what is new and ahead of what is next in technology has always been my thing. I had a beeper the size of a pack of cigarettes and a mobile phone bigger than a shoe box. I’m somewhat of a gadget geek. I like new and shiny. However, when it comes to all these new technologies I am ...
10/23/2010
4
Comments
You may have seen this before, it goes like this: a pop-up pops and it looks like a window on your PC. Next thing a scan begins. It often grabs a screenshot of your “My Computer” window mimicking your PCs characteristics then tricking you into clicking on links. The scan tells you that a virus h...
10/18/2010
2
Comments
In the late 90s and early 2000s, hacking had evolved from “phreaking” (hacking phone systems) to “cracking” (breaking into networks). At the time, hackers hacked for fun, for the challenge, and for fame and popularity within the hacking community. But soon enough, the public began spending more ...
10/09/2010
2
Comments
Strangers and posers: You tell your children not to talk to strangers, so why do you open the door to a total stranger? And never talk to strangers via an open or screen door. Home-invaders pose as delivery people, law enforcement or public workers. Distress: If someone is in distress tell him o...
10/07/2010
In a recent post (Hackers Play “Social Engineering Capture The Flag” At Defcon), I pointed to a game in which contestants used the telephone to convince company employees to voluntarily cough up information they probably shouldn’t have. Of 135 “targets” of the social engineering “game,” 130 blur...
10/07/2010
4
Comments
This is just a bad, bad story with no happy ending. There are home invasions, then there is this home invasion. Just when you think humans can’t get any meaner towards each other there is Steven Hayes and Joshua Komisarjevsky, the 2 men accused of a home invasion in Connecticut in 2007. Hayes an...
10/06/2010