Bomb Threats from Google Hacking?

By Space Rogue No comments

The worlds of physical and information security are quickly merging into one but people are still trying to take shortcuts. By now most people have heard news reports about bizarre crimes where stores are receiving bomb threats over the phone and are forced to wire money to some unknown account or the store will get […]

True Hackers and Middle America

By Space Rogue 1 comment

Once in a great while a technology reporter seems to ‘get it’ and publishes an acurate article without the FUD and fear mongering that usually accompanies a security related news item. When that happens it should be recognized. Take a moment and read “Middle Amercia, Meet the True Hackers” by Andy Greenberg at Forbes.

Remote iPhone exploit? Big Deal.

By Space Rogue No comments

So the folks over at Independent Security Evaluators claim to have found a remote iPhone exploit. Evidently this is big news as it has already garned an article in the New York Times (talk about media whoreing) and been granted a coveted speaking spot at the Blackhat Security Briefings early next month. Must be a […]

iPhone Security Myths Busted

By Space Rogue 3 comments

I know what your thinking, “Not more iPhone! Enough Already!” yeah, I know me to, but seriously there is just to much FUD floating around out there. FUD from reputable places such as Gartner. Well, OK maybe not that reputable but people still listen to them for some reason. They released a white paper last […]

Anti-Forensic Tools Evolving

By Space Rogue No comments

Interesting article over at CIO about the current state of anti-forensic software. It talks about specific tools like Timestomp, Slacker, Sam Juicer, Data Mule and others whose sole goal in life is to frustrate the forensic analyzer and make it difficult for forensic tools like EnCase and others used by law enforcement. After reading this […]

Hacking for Dollars $$$

By Space Rogue No comments

iDefense just announced a bounty of $16,000 for remotely exploitable zero-day flaw in Apache, BIND, Sendmail, OpenSSH. IIS, or Exchange. This comes on the heals of the $10,000 plus a MacBook recently awarded by CanSecWest for remotely exploiting an OSX laptop. While there are similarities between the two offers (not to mention iDefense and others […]

L0pht in Transition 2

By Space Rogue No comments

So I wrote about the article in CSO Magazine by Michael Fitzgerald earlier this month when the print version came out. Finally it is now online for easy reading by all you non-subscribers. Previous Works sysop Jason Scott of Admin-D and Textfiles.com fame has written a rebuttal/commentary/analysis of the piece. And finally in a completely […]

Cyber UL

By Space Rogue 3 comments

So why are there so many bad, nonsecure and just plain broken security products on the market? Should we depend on the unseen hand of the free market to allow the better products to bubble up to the top? Bruce Schneier’s recent column in Wired magazine shows that better products doen’t necessarily mean more secure […]

Mac Hack Hype

By Space Rogue 1 comment

So by now you have probably heard about the MacBook Pro that was compromised at CanSecWest last Friday. Here is a quick recap if you missed it. A MacBook Pro with all updates applied on a wireless network, if you can break in you win the laptop. Well, after two days no one broke in […]

Who Do You Trust?

By Space Rogue 1 comment

Over and over people tell me that a product, service or other item is secure because someone else important uses it, and they are sooo important that they would never ever use or do anything insecure. So basically what they are saying is that “I trust them so I will do what they do.” The […]