Security

Clients React to the WiFi Pineapple

Clients React to the WiFi Pineapple

The WiFi Pineapple is a very evil rogue access point (AP) that can quite easily trick an unsuspecting WiFi enabled device or user into connecting to itself. It does this mainly through a suite of programs called PineAP. Thanks to the makers of the WiFi […]

Anatomy of a Malicious GPS Tracker

Anatomy of a Malicious GPS Tracker

This is the kind of stuff I love. Recently I was given a GPS tracker from an individual. This tracker had been embedded in a victim’s car for 6 years. The following video examines the tracker’s components and method of install. Below the video you’ll […]

Auto Answer: Feature or Vulnerability

Auto Answer: Feature or Vulnerability

Auto Answer is a feature in many VoIP phones that allows the phone to go off-hook the very instant a call is received by the instrument. In this video we’ll look at how this feature is setup and talk about the security vulnerabilities. NIST Report:┬áLink […]

Monumental Security Practices

Monumental Security Practices

Every time I take someone sight seeing in DC, I can’t un-see them. I should be alright with CCTV cameras hanging off of structures. I’m a security professional. We eat vulnerabilities for breakfast and birth countermeasures at dinner. This, however is different. Let me demonstrate […]

Skinny Secure 002: Hackers vs Hackers, Airplanes vs Thumb-drives, & Students vs Teachers

Skinny Secure 002: Hackers vs Hackers, Airplanes vs Thumb-drives, & Students vs Teachers

Microsoft Hacked, Hackers Rejoice, Hackers Hacked Yesterday the Syrian Electronic Army (SEA) hacked several Microsoft Twitter accounts. The SEA is a contingent of hackers that are supportive of Syrian President Bashar al-Assad. After immediately taking credit for the attack and bragging all over the internet, […]

Skinny Secure 001: Monthly Technical Security Update

Skinny Secure 001: Monthly Technical Security Update

Every month I will be endeavoring to bring you little security snippets that may be of interest to all the techs out there. This last month has been an interesting one. Below you’ll find the Chinese agricultural espionage, billionaire security, systems, and a how to […]

Grad Students Find Undocumented Functions in SCADA Protocol

Grad Students Find Undocumented Functions in SCADA Protocol

Industrial Control Systems (ICS) have been an area of security concern for the past decade and was dramatically highlighted in the media with the whole Iran nuclear enrichment fiasco. When someone screws with your computer or smart-phone with a virus, it’s quite an inconvenience, but […]