Mobile Privacy – User Bill of Rights From EFF
Mobile smartphone apps represent a powerful technology that will only become more important in the years to come. But the unique advantages of the smartphone as a platform—a device that’s always on and...
View ArticleMobile Privacy, Security and Celebrities
There have been a number of recent stories with celebrities photos being leaked online, including Scarlet Johansson, Christine Hendricks, Olivia Munn and more. I was interviewed by Fox News regarding...
View ArticlePrivacy Invasion Lawsuit Names 18 Companies
Several companies have ben named in a class-action lawsuit as a result of mobile applications uploading contacts to servers without users’ consent. The mobile app developers who were following this...
View ArticleYou down with UDID? Yeah, you know me… my location and app activities
It was announced this week by the hacker group AntiSec that they compromised a laptop belonging to Supervisor Special Agent Christopher K. Stangl from the FBI taking advantage of vulnerability in Java...
View ArticleAnonymous vs GoDaddy: Social Media As Social Engineering
When GoDaddy’s services went down last week there was instantly speculation that Anonymous had something to do with it. The fact that the group has been responsible for a number of high profile hacks...
View ArticleIgnite Portland 11: Pwnd By Devices
My Ignite Portland presentation “Pwnd By Devices”…had a blast doing this, even though it was freaking hard:
View ArticleMobile Penetration Testing: There’s An App For That
Introduction Getting Inside The Phone Setup USB Hacks Network & Vulnerability Scanners Session Hi-Jacking & ARP Spoofing Wi-Fi Sniffing Remote Access Remote Shell & Scripting When most...
View ArticleVice.com Publishes Exclusive with John McAfee Reveals Location In iPhone...
Update: It looks like McAfee really is in Guataemala and has hired an attorney in the country. ( looks like our friends at Vice.com learned a lesson, they removed the EXIF data ) Vice.com published an...
View ArticleToorCamp 2012 – Tracking Technology, Forensics and Privacy
My presentation from this summer at ToorCamp, probably the most fun you can possibly have at a security conference. I learned tons.
View ArticleSenate Cyberstalking Bill To Close Privacy Loophole
Today the Senate Judiciary Committee is set to approve legislation sponsored by sponsored by Sen. Al Franken, D-Minn. that would block a loophole for “cyberstalking apps”. The purpose of the bill is to...
View ArticleDigital Privacy Isn’t Taken, It Is Given Away
Open Source Data & Surveillance With the Edward Snowden privacy leak there is an important factor that is being missed. It isn’t the government agencies that collect the data, they are merely...
View ArticleCase Study: Metadata Used to Track Craigslist Theft & Assault
We have been hearing a lot about metadata the last few months thanks to the ongoing revealing of NSA tactics and partnerships. Many have stated it is only “metadata” however there is a lot more to...
View ArticleProdigy/Telmex E-Mail Vulnerabilities Exposes Thousands of Accounts and Puts...
Over the past few weeks I have been working with El Economista on the discovery and disclosure of a massive security hole in Prodigy’s (Telmex) mobile email and web based mail systems in Mexico. The...
View ArticleRisks of “Cutting the Cord”: Home Security, Thieves & Cell Phone Jammers
I hear a lot about people “cutting the cord” stating they are free from their wired line and more disturbing is the fact they brag about this online via social media to the public. This puts people at...
View ArticleDigital Privacy Isn’t Taken, It Is Given Away
Open Source Data & Surveillance With the Edward Snowden privacy leak a few years back, there is an important factor we’re all missing. It isn’t the government agencies that collect the data. They...
View ArticleVice.com John McAfee Exclusive Reveals His Location in iPhone EXIF Data
Some time ago, the website Vice.com posted an article with the somewhat full of themselves title “We Are With John McAfee Right Now, Suckers”. In it, they reveal how they have been traveling with John...
View ArticleSony PSN Data Breach – Plain Text vs. Hashed Passwords Explained
There has been a rash of data breaches where passwords are compromised that were stored as plain text and not converted to a one-way hash as they should be. However, most consumers and even many...
View ArticleHow Your IP Address Can Be Used to Track You
IP (Internet Protocol) is a framework that governs activity by enabling 2-way communication on the internet. It does this by assigning unique protocol addresses to every device connected to the web....
View ArticleTop Benefits of Using a VPN in the UK
VPN technology has become very popular lately in the United Kingdom. It provides security when using any network, especially when sending encrypted data. If you’re interested in using a virtual private...
View ArticleHow Does a VPN Keep Your Data Transfers Safe
Do you transfer data either for work or personal purposes? If you haven’t experienced any problems yet, then consider yourself lucky. There’s no question that the Internet has made our lives easier in...
View Article
More Pages to Explore .....