Home » Archive

Articles Archive for Year 2014

Communications | Posted 30 Dec 2014 | Comments Off on How secure is your wearable? | 1,771 views

We know that common passwords are relatively easy to brute force. Now imagine that you are forced to use a 6 digit number for your password. How long would it take someone to get your password?

Security company Bitdefender has …

Defense In Depth | Posted 28 Dec 2014 | Comments Off on Ready for PCI DSS 3.0? | 1,454 views

Credit card data breaches are be becoming more prevalent in the news. Breaches result in lost time, money, and reputation for everyone except the hacker. Vigilance is critical.

Vendors have until January 1st to be compliant with the latest PCI …

In Other News | Posted 28 Nov 2014 | Comments Off on Uber’s Privacy Problem | 1,426 views

Uber recently blogged about their privacy policy. They claim to use the info they collect for a limited set of legitimate business purposes. When installing the Uber app on Android, the app requests access to the user’s camera, …

Communications | Posted 28 Oct 2014 | Comments Off on AT&T’s New Tracking System | 1,500 views
AT&T Filler Panel

AT&T is testing a new relevant advertising system. It works by providing a unique identifier to every website that you visit on your cell phone.  Kenn White has created a test page to verify the presence of the UID. AT&T …

In Other News | Posted 21 Oct 2014 | Comments Off on Windows Zero Day | 1,498 views
Microsoft Windows Logo

Microsoft has published an advisory for a Windows 0 day exploit. The exploit is related to the Object Linking and Embedding (OLE) functionality in Windows. OLE functions allow files or data from one file to be embedded into another document …

In Other News | Posted 21 Oct 2014 | Comments Off on Did the DEA go too far? | 1,184 views
Facebook Filler Panel

Sondra Arquiett was busted for possession of cocaine.  She pled guilty and received probation.  She later discovered that the DEA opened a Facebook account in her name and was impersonating her online.  The DEA went so far as to post …

In Other News | Posted 21 Oct 2014 | Comments Off on Android Malware Delivered Via Stego | 973 views

Help Net Security is reporting that malware can be delivered to an Android device via steganographic techniques.  The exploit works by disguising the malware in an encrypted image file. Some obfuscated code is included in the APK to extract the …

Communications | Posted 20 Sep 2014 | Comments Off on Apple/Google Will Encrypt Phones | 924 views

Both Apple and Google have announced that they will be encrypting data on their future operating systems. Both companies are claiming that they will be unable to recover data from the their devices for law enforcement.  Will this tactic of …