How many scans are attacking the Internet?
The 23rd USENIX Security conference 8/20 – 8/22 2014 discussed many subjects There is a specific paper about “An Internet-Wide View of Internet-Wide Scanning” by Zakir Durumeric University of Michigan…
Defend Your Systems
The 23rd USENIX Security conference 8/20 – 8/22 2014 discussed many subjects There is a specific paper about “An Internet-Wide View of Internet-Wide Scanning” by Zakir Durumeric University of Michigan…
Wired story of “Project Zero” Although initially the story is a nice feel good story of hiring George Holtz after he hacks the AT&T iPhone lock and reverse engineering the…
The Onion gives a joking reference as to how some choose their passwords. Putting your livelihood in the ability of hackers to guess your favorite TV show is funny. Some…
The Financial Times discusses a potential “Black Swan” event. International Organisation of Securities Commissions = IOSCO A Black Swan event definition: A “Black Swan” is a highly improbable event with…
Article at Quora.com Outlines a script called rubber ducky that infects a Mac computer and then uploads your documents directory to wherever the script tells it to. They have tested…