
We Got Hacked, Now What?
Hopefully you really have a good answer for this. Getting hacked is no longer a distant probability; it’s a harsh reality. The most recent incident was Evernote losing customer information including email addresses and passwords to a hacker. I’m an Evernote customer and I watched the drama unfold from the perspective of an end user. […]

Public Honeynet Data – Who are the top 20 hacking countries?
Public Honeynet Data – Who are the top 20 hacking countries? I could watch this site all day. In case you were wondering really wondering who the top hacker countries are, the German Alliance for Cyber Security has a dashboard display as to what is happening on 97 honeypots around the internet. It makes for […]

The best Spam Message I have ever received
Sometimes you just get an awesome spam message that is too sweet not to pass up. Today I got one that simply rocks. Everything left intact, including typos, formatting, and grammar. Simply brilliant. Anti-Terrorist and Monetary Crimes Division Fbi Headquarters In Washington, D.C. Federal Bureau Of Investigation J. Edgar Hoover Building 935 Pennsylvania Avenue, […]

Cooperating with Law Enforcement in Social Networking
Social Networking is facing the prospects of being deputized by the Australian Image via CrunchBase Federal Police, Facebook, and other social networking sites are increasingly becoming one of the most important sources for intelligence about people. Forget neighbors talking to the police, now we are looking at our socially connected world as being involved with […]

One of the members of LulzSec reported to be an FBI mole
So much for not selling out your gang. It looks like Sabu one of the folks who has been speaking for LulzSec has been secretly working for the FBI according to multiple online reports. Lulzsec has been one of the leading hacking groups and has seriously gone after a ton of people, companies, and others […]

OSCON: Energy + Awesome + Space Exploration + Hacking
I wanted to post these two keynotes from OSCON 2011. They really bring out the spirit of exploration, adventure, care, and doing things bigger than oneself. This is about doing things that go beyond the cat picture of the day. These presentations, well, I’ll let them speak for themselves. Absolutely great!

OS Bridge Day #1: Hacking for Freedom
Keynote: Hacking for Freedom
(Description of Hacking for Freedom)
Day #1 has kicked off with a bang. A keynote that really pulled at the heart strings for the love of freedom and liberty! The notion of technology being involved directly to those pushing for their freedom in other parts of the world is huge. Below I’ve snagged… read more…

Cloud based Business Intelligence as a Service
While Business Intelligence is not a new issue, cloud based business intelligence as a service (BIaaS) is a topic worth noting – because it is starting to catch on equaling the playing ground between big players in ERP and CRM with smaller players wh…

Surprising little information about Cloud Computing and Terrorism or Crime
All new technologies introduce security concerns, from faulty applications, to faulty configurations, to users who are simply dangerous in the new environment. A cloud computing infrastructure is no different from the basic idea of being misused, by an…

Are You Still Using Your Real Credit Card Online? You Shouldn’t.
So iTunes got hacked and some users saw unauthorized purchases up to $600 in their accounts. I’m shocked. Not at the fact that iTunes got hacked, but that users exposed their credit accounts to such extent. Websites do get hacked, it’s a fact of life. Users need to change their passwords, consider what other sites […]

Cooperating with Law Enforcement in Social Networking
Social Networking is facing the prospects of being deputized by the Australian Federal Police, Facebook, and other social networking sites are increasingly becoming one of the most important sources for intelligence about people. Forget neighbors talking to the police, now we are looking at our socially connected world as being involved with law enforcement. IT […]

Cleaning up after Antivirus Soft on Vista
It has been about three years since I caught a computer virus, but a nasty little chunk of malware broke through my browser and Anti-Virus last night called Antivirus Soft. Here is a quick way of cleaning up after being taken out by this rogue chunk of malware in a few easy steps. The cleanup […]

Hacker Disables Cars via the Web – Our Remote Controlled Life
This is what remote controlled toy cars looked like when I was a kid. Yes, the control box was connected to the car with a 3-4feet cable… not exactly the level of freedom you get with today’s wireless models. But it was fun, nevertheless. I wonder if 20-year-old Omar Ramos-Lopez had a toy car when […]

Yes it is possible to resource starve a Cloud Computer
Over the weekend, my cloud computing infrastructure survived a major hacking attack. Here is what happened and what it took to recover it. This weekend my servers out in the cloud space fended off a major hacking attack across two of the systems that I have given the public access to use them. The attack […]

Turn your IPod, Iphone or soon the Ipad into a hacker system
For all the complaints against apple for making it hard to get an application registered and sold in the Apple store, there are some very cool applications that can be used to set up your Iphone or other apple Iphone OS based system into an excellent scanning and pseudo hacker tool. These are the products […]