Home » Author Archive

The Cyber Witch Hunts 2017

The Salem Witch trials began in the spring of 1692, a group of girls in Salem, Massachusetts, unhappy in the way they perceived that they were being treated, claimed to be possessed by the devil and accursed a bunch of the local village woman of witchcraft, mass hysteria prevailed. Eventually resulting in nineteen woman put to death by hanging and a further 150 woman, men and children being accused of witchcraft. Fast forward some three hundred years to the spring of 2017 and mass hysteria is again the order of the day. For those that have been... 
 

Cyber Security Conference – cyph3r

As a cyber security guy I always start the year looking at what security conference are coming up in the next 12 months, just so I can plan my itinerary. You always get the SANS events which are always good quality, especially their training sessions, although they can be a tad expensive. You also get the specialist events, those focused on encryption, those focused on regional forums and more recently those focused on Crypto-currencies like BitCoin or DodgeCoin, which, if you are interested in those fields that’s great, but not of an interest... 
 

Shut Up and Take My Money : Hoverboard!

I want one so bad. I would be a god at Comic Con with my Green Goblin Suit!  Read More »
 

The Best Longboards on the Market

Longboards are awesome, from speeding down hills at 40 miles an hour, cruising around town or pulling of some cool tricks, you going to have a good time with a longboard. Check out these guys. So what are the best, well it depends on what your plans are, a cruising longboard is a different setup than a “go bat of hell down a hill” board. Below ware the best I have found, either because I have owned them myself or my friends have owned them. Need for Speed In the video above the guys are running on a Acid Addict board with Aera Trucks,... 
 

Tesla Gets Hacked

Earlier today both the Tesla Motors Website and Twitter account was hacked, followed closely by Elon Musk’s Twitter account. The hackers tweeted that if you were to follow two Twitter accounts that you would get a free Tesla car. The hacked website had a notice that claimed to be hacked by Twitter user’s by the name of rootwrox and chf060. While the @chF060 account has been silent on the matter, @rootworx has responded to say he was not involved and believes it is a “16yr old script kiddie based out of Finland” is responsible... 
 

Sony Gets a Lesson from North Korea Supreme Leader

Beware, humor at large, if you watch this there is significant risk of uncontrolled laughter at the expense of both North Korea and Sony.  Read More »
 

Reviewed : Hacking – The Art of Exploitation 2nd Edition

I have previously written an article on the “Best Books to Learn Hacking“, one book I did not review at the time, but was subsequently recommended to me by one of our Pen Test gurus was “Hacking – The Art of Exploitation 2nd Edition”, by Jon Erickson. This book is a winner. The CD included a complete Linux programming and debugging environment, which I could have really used when I was first starting out. I even stole some of their ideas and implementations for my current sandbox. There are plenty of code and examples... 
 

The Best Anti-Virus to Protect You When Online!

I use to work for an Anti-Virus company, I still work for a large american security vendor, so I know the troubles you can get in to when online. The bad guys want to get a Trojan or Malware on to your PC, so they can steal your bank details, steal your PayPal details or use your machine to commit fraud around the globe. There is some good news and bad news, the good news is there are a couple of things you can do to protect yourself, as described below, the bad news is they are pretty determined. The current going rate for you PayPal details on... 
 

Encrypted Portable Hard Disk

I have got a new toy, and its cool. An Encrypted Portal Hard-disk that can only be accessed if you know the pin, which you must type in to the number pad on the front of the drive. I have a new contract with a local government client, where I am creating a new database for at risk individuals. They take user data protection pretty seriously and required that all documents I took off premises is protected, that includes providing protection in the case of losing my laptop, USB Stick or portable drive. They, as well as all UK government organisations,... 
 

SonaVault Email Archiving Software Review & Ratings

Nowadays business communication is pretty much exclusively via email, I mean who uses a phone, or Skype or heaven forbid a fax? pretty much no one. In fact the last survey on business communication came down at over 90% of business communication is done via email, the phone was a distant second with less than 5% and WebEx or Webinars coming in third at 3%. So protecting your email is a pretty critical function in this day and age, especially when content is likely to be highly sensitive, valuable or just business critical. With that in mind regular... 
 
© 2006-2017 Security Magazine.