You Should Set Up haveibeenpwned Alerts For Your Entire Organization Right Now
In a world where a constant flow of breaches are in the news, it's important to stay on top of compromised accounts for cloud services and respond quickly. Even more…
James Gallagher is an ethical hacker, musician and philosophical anarchism evangelist. He is an experienced penetration tester, providing adversary simulation consulting for organizations around the U.S. James recently completed 10 months living nomadically in a converted school bus with his family, hacking into networks from the wilderness. Armed with only his ukulele and laptop, he has a passion for a better world, where individuals and communities can thrive without the need for authoritarian models.
In a world where a constant flow of breaches are in the news, it's important to stay on top of compromised accounts for cloud services and respond quickly. Even more…
Whether it violates the Fourth Amendment of the U.S. Constitution or not, it’s an unfortunate fact that U.S. Customs and Border Protection agents routinely force travelers entering the country to…
Last month, the State of California banned default passwords on network devices, starting January 1, 2020. This law mandates that manufacturers preprogram a unique password for each individual device and…
Last week, a so-called vulnerability acquisition company by the name of Zerodium disclosed a Tor Browser 0-day vulnerability to the public, in an apparent PR stunt. As you may know,…
For an unknown amount of time, the Chrome browser has contained a vulnerability which allows malicious websites to hijack the back button. This was recently demonstrated with striking effect by…
Is your home router a sitting duck with ports open to the world just waiting to be hacked? Let's go over how you can check. First, it's important to start…
It’s a little easier to attack some wireless networks than previously thought. That’s because Jens Steube, the developer of the popular password cracking tool hashcat, has found a new way…
A major difficulty in defending against attackers and performing accurate attribution, lies in the fact that threat actors often route their traffic through the proverbial seven proxies. Defenders often spend…
A big question for those who consider internet privacy essential is how to best use Tor in combination with a VPN service provider like Private Internet Access. Should a Tor…