Monthly Archives: June 2014

Got Hacked? Get even: Using Honeypots, Honeynets, and Sinkholes to Hack the Hackers

If you’ve ever been hacked, you know the feeling of being violated that comes with it. In the simplest and most common scenario, someone has gotten into your email, read your address book, and sent out spam to all of … Continue reading

Posted in Uncategorized | Tagged , , , , , , , | Leave a comment

Open Backdoors, Broken Windows, and Tainted Chips: A Brief History of the Ongoing Microsoft-China War

When I visited China in 2000, you could buy the newest pirated version of Windows almost anywhere. In fact, you’d be considered stupid if you bought the licensed version. After all, how many Chinese were rich enough, at that time, … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , | Leave a comment

Amazon and eBay Stop Sale of Samsung Galaxy 4 Clone: Chinese-Made Star N9500 Found to Contain Pre-Installed Dangerous Spyware

Yesterday, Ebay reported it would no longer be selling the popular Chinese-made Star N9500 smartphone after German security firm, G Data, discovered dangerous pre-installed spyware on the device. Amazon initially refused to comment on the story but, this morning, when … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , | Leave a comment

Made in USA, Remade in China: Part 1: Chinese Cyber Intimidation Spreads Beyond Its Borders

I have a simple way to assess the freedom of the country you’re in. Go to the capital city, stand in a visible public place, and make a speech criticizing the current leadership. If nothing happens besides your getting a … Continue reading

Posted in Uncategorized | Tagged , , , , , , , | Leave a comment

Mandiant Webinar Highlights the Difficulty of Dealing with the Latest Varieties of Cyber Attacks

In the latest Mandiant webinar, consultants Chris Oetting and Mike Middleton explained the difficulty of restoring an organization’s network after it has suffered a serious cyber attack. About 30% of recent cyber attacks that Mandiant has responded to involve organizations … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

Businesses, Government Agencies, and Political Dissenters Beware. Chinese Predators May Be Lurking at the Waterhole: Understanding Waterhole Attacks

There are three main reasons for hacking. One is for financial gain, one is for acquiring protected information, and the third is to achieve some political objective. The second reason for hacking, that of acquiring protected information, is often used, … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Leave a comment

An Analysis of a Romance Scam Letter: Implications for Businesses

Today I received a request from a Polish woman that I know. She wanted my advice about an email that she had received from some guy she didn’t know. She was about to respond to it but, knowing that I … Continue reading

Posted in Uncategorized | Tagged , , , | 16 Comments