The buzz around smartphone and tablet app hacking has started to increase even more since the beginning of the year. But also making some waves in recent weeks has been the application of existing technology to allow vehicles to communicate. Automobile companies have been in the news lately concerning the Vehicle-To-Vehicle (V2V) communication system. This tech basically allows cars to communicate signals to each other over a dedicated wireless infrastructure (the implementation of which is actually being funded). Among my concerns was the idea that such an infrastructure might attract the curious-minded. Certainly there would be concerns over privacy (tracking?), spoofed signals, hijacked systems, and other shenanigans. If manufacturers embrace this on a wide-scale (perhaps if it becomes a safety[…]

Sometimes you receive an encrypted e-mail that you can’t open. I don’t know about other clients, but Outlook doesn’t allow you to do much with e-mails that aren’t encrypted for you, and if you’re like me, you want more information. You want to know exactly what went wrong. So, here is a quick way of retrieving the information you need from an Outlook e-mail in order to find out which certificates were used to encrypt the e-mail.  (Note: This method may not always work, but I have found it useful many times in the past.)

My name isn’t common, but there’s at least one other person with that name. And he’s not at all careful about email addresses. I’ve had email from him in the past – or, rather, from organizations to whom he’s given my email address. I feel as if I know him. I know where he went to school; I know who he works for. I know who he donates money to. I think I even saw his birthday in one of the emails. And now I know he lost his passport.

Back in 2007 a group of American hackers went to Germany and toured this esoteric place known as a hacker space. They liked what they saw and quickly founded the first hacker spaces in the United States. The goal was to set up collective spaces where curious types could come in and work on personal and group projects, often involving equipment that isn’t feasible to have in your living room. Cut to the end of 2010 and hacker spaces are established all over the globe, with the United States completely obscured by red balloons on the hacker spaces map. Since the beginning, hacker spaces has grown into a phenomenon in its own right. There are panels on hacker spaces at[…]

Recently I found myself playing red cell at Computer Sciences Corporation’s Cyber Defense Competition. By the time I heard about it, the competition was well underway, students were crying and vomiting all over the competition room (I exaggerate) and Meterpreter shells on every student network. I quickly ran into Tim Rosenberg from White Wolf Security and found some space at the red cell table for me and my Backtrack netbook. I spent the rest of the day harassing my former team from James Madison University, as well as 3 other school teams from the Virginia/D.C./Maryland area. Rarely as a pentester will you find a gig where the scope includes defacing websites with lolcats, chatting with employees through Nuclear RAT, and[…]

The din has increased of late over the “need” for AV on all Macs. Historically, there haven’t been a lot of overt malware threats to the platform, and thus it has persisted as a special case, for better or for worse. Commercial solutions have existed for years, and yet in the past few weeks some of those packages have been released for free (presumably because they’re not making much money anyway). Some cite “Boonana” as the latest “big” threat since Koobface… New Mac Trojan uncovered: “Boonana” New Java trojan attacks Mac OS X via social networking sites Of course, then the threat is downplayed… Intego classifies new Mac trojan threat as “minimal” Nonetheless, it seems that there *is* Mac malware…[…]