Linux Rootkits Hard to Detect
First of all what is a rootkit? A collection of software that runs and tries to hide from the computer user and administrator while also allowing the attacker access to…
How About Adversary Based Threat Analysis?
Another Thotcon presentation was very good, unique and moves the industry forward. Julian Cohen presented This idea: “Understanding Your Adversaries” In his talk: “Adversary-Based Threat Analysis” He explained that in…
Burnout in Infosec Means All is Lost?
Thotcon (Chicago’s Hacking Conference) thoughts… Saw several good Cybersecurity presentations while one of the keynotes “Josh Corman” discussed the burnout of the infosec opsec community. This is a problem for…
Internet Cameras Vulnerable to Attacks With No Fix
If there is no way to fix a vulnerability what do you do if you have a camera with a vulnerability? Here is the quote on Threatpost (from the engineer…
Review of “Anon” movie
In the spirit of a lighter fare this Sunday. Watching Anon (again) it is an interesting futuristic movie where there is a video recording of everything. Apparently everyone has a…
