Skip to main content

Security

Tor Is For Everyone: Why You Should Use Tor

posted onJune 16, 2014
by l33tdawg

EFF recently kicked off its second Tor Challenge, an initiative to strengthen the Tor network for online anonymity and improve one of the best free privacy tools in existence. The campaign—which launched with partners at the Freedom of the Press Foundation, the Tor Project, and the Free Software Foundation—is already off to a great start. In just the first few days, it's seen over 600 new or expanded Tor nodes—more than during the entire first Tor Challenge.

Root almost any Android device, including AT&T or Verizon Galaxy S5, with towelroot by geohot

posted onJune 16, 2014
by l33tdawg

Sometimes things are serendipitous in the tech world. This past Friday, I received a Verizon Samsung Galaxy S5 to review for BetaNews. Yesterday, as part of my testing, I wanted to see how easily I could achieve root access. To my surprise, after many weeks on the market, root was still unachieved by anyone. I even learned that the xda community had raised $18,000 in pledges for whoever could achieve root for both the Verizon and AT&T variants.

Setting up an Evil Access Point with Kali Linux

posted onJune 12, 2014
by l33tdawg

A few days ago, we had the opportunity to deploy a rogue access point that would steal user credentials using a fake, captive web portal, and provide MITM’d Internet services via 3G. We needed reliability and scalability in our environment as there would potentially be a large amount of, erm….”participants” in this wireless network. We were pretty happy with the result and quickly realized that we had created a new “Kali Linux recipe”. Or in other words, we could create a custom, bootable wireless evil access point image, which could do all sorts of wondrous things.

Malwarebytes launches Anti-Exploit - claims it'll stop the worst attacks on PCs

posted onJune 12, 2014
by l33tdawg

Imagine a world of Windows computer security where the latest zero-day exploits that seek to gain access to your computer are rendered ineffective before they can be used against you.

That world doesn't exist yet, but it took a giant step closer to reality with Malwarebytes Anti-Exploit, a new Windows security program released Thursday. It's powered by exploit-blocking technology that Malwarebytes acquired last year when it bought ZeroVulnerabilityLabs.

Food chain, PF Chang's, investigates possible card breach

posted onJune 11, 2014
by l33tdawg

A large batch of stolen credit card numbers for sale on an underground forum may have come from a breach at P.F. Chang's China Bistro, a restaurant chain that said on Tuesday it is investigating.

Those selling the stolen data are claiming all of the card numbers are still valid, meaning the data is fairly fresh and that banks haven't yet canceled the accounts, said Alex Holden, CTO of Hold Security, a Wisconsin-based consultancy that monitors secret forums where stolen data is sold.

Nowhere to hide: The reign of cyber criminals is coming to an end

posted onJune 11, 2014
by l33tdawg

During the 1920s and 1930s, a part of the U.S. public rooted for gun-toting, mythologized bank robbers like Bonnie and Clyde, John Dillinger, and Pretty Boy Floyd. But the fantasies were often tempered by reports of guards, police, and innocent bystanders injured and killed in the frequent shoot-outs.

Unlocking the Past: How a 19th Century Lock Pick Changed Security Forever

posted onJune 10, 2014
by l33tdawg

In April 1851, Alfred C. Hobbs boarded the steamship Washington bound for Southampton, England. His official duty was to sell the New York City-based company Day and Newell's newest product – the parautopic lock – at a trade show – London's Great Exhibition. But Hobbs had something a bit more nefarious up his sleeve, or rather in the small trunk that accompanied him on the ship.