Home » Author Archive

Tesla Gets Hacked

Earlier today both the Tesla Motors Website and Twitter account was hacked, followed closely by Elon Musk’s Twitter account. The hackers tweeted that if you were to follow two Twitter accounts that you would get a free Tesla car. The hacked website had a notice that claimed to be hacked by Twitter user’s by the name of rootwrox and chf060. While the @chF060 account has been silent on the matter, @rootworx has responded to say he was not involved and believes it is a “16yr old script kiddie based out of Finland” is responsible... 
 

Sony Gets a Lesson from North Korea Supreme Leader

Beware, humor at large, if you watch this there is significant risk of uncontrolled laughter at the expense of both North Korea and Sony.  Read More »
 

Reviewed : Hacking – The Art of Exploitation 2nd Edition

I have previously written an article on the “Best Books to Learn Hacking“, one book I did not review at the time, but was subsequently recommended to me by one of our Pen Test gurus was “Hacking – The Art of Exploitation 2nd Edition”, by Jon Erickson. This book is a winner. The CD included a complete Linux programming and debugging environment, which I could have really used when I was first starting out. I even stole some of their ideas and implementations for my current sandbox. There are plenty of code and examples... 
 

Cool Tech : An Ink-less Printer

You can now turn your mobile phone in to the 80’s favorite, an instant Polaroid Camera. From the makers of the, well the, Polaroid Camera comes the Polaroid Printer! It allows you to take any photo from your mobile phone and instantly print it to the Polaroid Zip Mobile Printer. They provide an App, avliable on Android and iOS, that allows you to take virtually any image and instantly print 2×3 inch color photos. The App has a bunch of filters, effects and controls, think Instagram, to allow you to apply your creative genius before... 
 

The Best Anti-Virus to Protect You When Online!

I use to work for an Anti-Virus company, I still work for a large american security vendor, so I know the troubles you can get in to when online. The bad guys want to get a Trojan or Malware on to your PC, so they can steal your bank details, steal your PayPal details or use your machine to commit fraud around the globe. There is some good news and bad news, the good news is there are a couple of things you can do to protect yourself, as described below, the bad news is they are pretty determined. The current going rate for you PayPal details on... 
 

The Six Best Online Games on The Planet, Right Now!

Games are a huge industry and the online versions have continued to grow at substantial rates. Popular games can easily generate billions of dollars for their makers, even though they will cost less than big budget movies to make. The appeal of pitting your wits against other humans on the battle field has long been a human endeavour, to be able to do so in a safe environment and live to fight another day, even after being crushed in battle, is unrivaled. The most popular online games fulfill that need, that challenge, to beat down your opponents... 
 

We Are Getting Hacked, Because of Bad Security Practices! Avoidable Practices!

Not that we need more proof of the average Joe’s lack of security awareness, but Verizon are out with their annual security breach report stating exactly how the bad guys are getting in to our networks and it does not look good for the average Joe. The answer, Phishing, Bad Web Security and Weak Passwords. Two out of every three attacks were based on using legitimate user credentials to access the compromised systems. These credentials were gained via one of two common methods, brute force the password or just ask the user to provide you the... 
 

Encrypted Portable Hard Disk

I have got a new toy, and its cool. An Encrypted Portal Hard-disk that can only be accessed if you know the pin, which you must type in to the number pad on the front of the drive. I have a new contract with a local government client, where I am creating a new database for at risk individuals. They take user data protection pretty seriously and required that all documents I took off premises is protected, that includes providing protection in the case of losing my laptop, USB Stick or portable drive. They, as well as all UK government organisations,... 
 

Apple iWatch Reviews Are In, And….

That reviews are in and it is not good news for the new Apple Watch. Complaint from across the Internet seem to be that the watch is too intrusive, always buzzing or Tapping on your arm when new notifications come in from emails, Twitter, Facebook and LinkedIn. To fiddly, difficult to open new apps and shut down things like alarms and suggestions you need doll hands to select the item you need from the front screen. Bad battery life, even with basic use, you know like telling the time, checking emails on its minuscule screen and maybe even... 
 

SonaVault Email Archiving Software Review & Ratings

Nowadays business communication is pretty much exclusively via email, I mean who uses a phone, or Skype or heaven forbid a fax? pretty much no one. In fact the last survey on business communication came down at over 90% of business communication is done via email, the phone was a distant second with less than 5% and WebEx or Webinars coming in third at 3%. So protecting your email is a pretty critical function in this day and age, especially when content is likely to be highly sensitive, valuable or just business critical. With that in mind regular... 
 
© 2006-2025 Security Enterprise Cloud magazine.