Author Archives: Steve Mierzejewski

About Steve Mierzejewski

Marketing consultant for InZero Systems, developer of the next generation in hardware-separated security, WorkPlay Technologies, TrustWall and Mobile bare-metal virtualization. I've worked in Poland, Japan, Korea, China, and Afghanistan. I'm a writer, technical editor, and an educator. I also do some work as a test developer for Michigan State University.

Using Ultrasound to Hack Air-Gapped Computers

Air-gapped computers are computers that are not connected to any network. They may even be physically isolated. Such computers are usually presumed to be safe from cyber manipulation. For this reason, businesses or organizations will often store important data on … Continue reading

Posted in Uncategorized | Tagged , | Leave a comment

Fake Lawyers and Law Firms Scam Multiple Victims in Multiple Ways

When I started investigating this problem, I thought I might find a few fake law firms being used as fronts to perpetrate fraud. I now realize that I profoundly underestimated how widely this attack vector is being used. In fact, … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Trending: Hacking School Networks to Change Grades

Have you noticed a sudden increase in your son’s or daughter’s grades? Do you wonder how they can do so well at school when they seem to spend most of their time playing online games? Well, maybe there’s a simple … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

New Malware Uses a Facebook-YouTube-Chrome Combo to Steal Bitcoins

The FacexWorm has been around since late last year, but it has been continually upgraded to be more efficient in stealing Bitcoins. It’s use of a select blend of social media to propagate itself makes it rather unique and may … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

World Cyberwar I

Minor skirmishes in preparation for an all out cyberwar have been taking place in the Middle East for a number of years now. Since the Stuxnet attack on Iran’s nuclear facilities in 2010, the region has seen a number of … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

The Dangerous Rise in Code Injection Attacks

So what’s code injection and why is it dangerous? In terms of a malware exploit, code injection is performed by an attacker to make a legitimate application do something it shouldn’t. Attackers place or inject code into an application or … Continue reading

Posted in Uncategorized | Tagged , , , , , , | Leave a comment