2015 in review

The WordPress.com stats helper monkeys prepared a 2015 annual report for this blog. Here's an excerpt: The concert hall at the Sydney Opera House holds 2,700 people. This blog was viewed about 20,000 times in 2015. If it were a concert at Sydney Opera House, it would take about 7 sold-out performances for that many … Continue reading 2015 in review

The 10 Most Significant Hacks of 2015

The key word here is ‘significant’. It would be easy to classify hacks according to how many people were compromised, but that is only one factor in determining if a hack is significant or not. Other factors must include the value of the information stolen or compromised, the uniqueness of the mode of attack, and … Continue reading The 10 Most Significant Hacks of 2015

Just in Time for the Holidays; History’s Worst Credit Card Hack

If you ever attend a black hat hacker convention, you will be warned not to carry credit cards. You are advised to keep all credit cards in your hotel room or, if you must carry them, to bunch them together or put them in a special holder. But wait a minute. Aren’t retailers supposed to be … Continue reading Just in Time for the Holidays; History’s Worst Credit Card Hack

Dangerous New Attack Vectors Unveiled at Black Hat Europe 2015

For most companies and institutions, security is a game of catch-up. You may have the most up-to-date security software available to protect yourself from all known threats, but it’s the threat a few years down the line that will likely be your undoing. You can’t prepare yourself against an attack vector that currently doesn’t exist. … Continue reading Dangerous New Attack Vectors Unveiled at Black Hat Europe 2015

How Terrorists Communicate

One of the first questions many security experts had about the Paris terrorist attacks was: How is it possible that such a well-planned and coordinated attack could fly under the intelligence radar? The answer to this question was quite surprising. It was, according to some in the intelligence community, that they had too much intelligence. … Continue reading How Terrorists Communicate