Quantcast
Channel: Voice of VOIPSA » Shawn Merdinger
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

eBay: a hacker’s source for acquiring remote monitoring medical devices for...

Awhile back I blogged on VOIPSA about medical devices using VoIP. This is a follow-up to that post, and is a bit more tangible in that these devices are showing up on the auction sites. I typically...

View Article



Image may be NSFW.
Clik here to view.

Chisco: Welcome To The Hunan Network?

On NPR’s ‘Fresh Air’ this week, Richard Clarke made some great points, in particular with the logic bomb scenarios of sneaking in code and untrustworthy hardware. While this is old news, it’s still a...

View Article

Image may be NSFW.
Clik here to view.

Linux crash on a Plane!

I don’t travel nearly as as much as I used to, yet when I do I always keep a sharp eye out for the technical glitches in devices around me in travel environments. What can I say? It provides me endless...

View Article

Image may be NSFW.
Clik here to view.

Weaponizing the Nokia N900 – Part 1

In the 80s movie “The Color of Money” there’s a great scene where a player challenges Tom Cruise’s character to a game. He strolls up to Vincent and says “So what you got in there?” — to which Vincent...

View Article

Risks Of Phone Removal From University Dorm Rooms

Risk:  A Growing And Disturbing Trend   Today the Washington Post and WSJ Blog both reported on a decision by the University of Virgina Housing Division to remove phones from student dorm rooms.  The...

View Article


Revisiting Shodan Computer Search Engine: Oh Noes, the places you’ll go!

I’m sorry to say so But, sadly it’s true That bang-ups and hang-ups Can happen to you – Dr. Seuss, "Oh, the places you’ll go!" (1990) Back in January 2010, I wrote a short blog post about Shodan and...

View Article

Image may be NSFW.
Clik here to view.

It’s a Feature! — Remote Tapping a Snom VoIP Phone

I have a bit of history in attacking VoIP phones, specifically VoIP Wifi phones. Way back in 2005-2006 I purchased several VoIP Wifi phones and conducted very basic security analysis to demonstrate a...

View Article

Image may be NSFW.
Clik here to view.

Weaponizing the Nokia N900 – Part 2

Welcome to the 2nd post in my series of leveraging the power of the Nokia N900 handheld using opensource, cutting-edge security tools for ethical penetration testing. In keeping with the theme, the...

View Article


Image may be NSFW.
Clik here to view.

Weaponizing the Nokia N900 – Part 3

Welcome to the 3rd post in my series of leveraging the power of the Nokia N900 utilizing opensource, cutting-edge security tools for espionage/ethical penetration testing. As mentioned in my last...

View Article


Image may be NSFW.
Clik here to view.

Data Loss Prevention: 10 Technical Questions To Make Your Vendor Squirm

“There’s a war out there, old friend. A world war. And it’s not about who’s got the most bullets. It’s about who controls the information. What we see and hear, how we work, what we think… it’s all...

View Article
Browsing all 10 articles
Browse latest View live


Latest Images