eBay: a hacker’s source for acquiring remote monitoring medical devices for...
Awhile back I blogged on VOIPSA about medical devices using VoIP. This is a follow-up to that post, and is a bit more tangible in that these devices are showing up on the auction sites. I typically...
View ArticleChisco: Welcome To The Hunan Network?
On NPR’s ‘Fresh Air’ this week, Richard Clarke made some great points, in particular with the logic bomb scenarios of sneaking in code and untrustworthy hardware. While this is old news, it’s still a...
View ArticleLinux crash on a Plane!
I don’t travel nearly as as much as I used to, yet when I do I always keep a sharp eye out for the technical glitches in devices around me in travel environments. What can I say? It provides me endless...
View ArticleWeaponizing the Nokia N900 – Part 1
In the 80s movie “The Color of Money” there’s a great scene where a player challenges Tom Cruise’s character to a game. He strolls up to Vincent and says “So what you got in there?” — to which Vincent...
View ArticleRisks Of Phone Removal From University Dorm Rooms
Risk: A Growing And Disturbing Trend Today the Washington Post and WSJ Blog both reported on a decision by the University of Virgina Housing Division to remove phones from student dorm rooms. The...
View ArticleRevisiting Shodan Computer Search Engine: Oh Noes, the places you’ll go!
I’m sorry to say so But, sadly it’s true That bang-ups and hang-ups Can happen to you – Dr. Seuss, "Oh, the places you’ll go!" (1990) Back in January 2010, I wrote a short blog post about Shodan and...
View ArticleIt’s a Feature! — Remote Tapping a Snom VoIP Phone
I have a bit of history in attacking VoIP phones, specifically VoIP Wifi phones. Way back in 2005-2006 I purchased several VoIP Wifi phones and conducted very basic security analysis to demonstrate a...
View ArticleWeaponizing the Nokia N900 – Part 2
Welcome to the 2nd post in my series of leveraging the power of the Nokia N900 handheld using opensource, cutting-edge security tools for ethical penetration testing. In keeping with the theme, the...
View ArticleWeaponizing the Nokia N900 – Part 3
Welcome to the 3rd post in my series of leveraging the power of the Nokia N900 utilizing opensource, cutting-edge security tools for espionage/ethical penetration testing. As mentioned in my last...
View ArticleData Loss Prevention: 10 Technical Questions To Make Your Vendor Squirm
“There’s a war out there, old friend. A world war. And it’s not about who’s got the most bullets. It’s about who controls the information. What we see and hear, how we work, what we think… it’s all...
View Article