The Deep Web Part II: Shady Deals in the Gray Market

Would you pay $300,000 dollars for a zero-day exploit like the Heartbleed bug? Well, somebody does, and it’s not the traditional hacker bad guys. They don’t have this kind of money. But before we get into the buyers, let’s see what they get for their money. First of all, they get exclusive rights to the … Continue reading The Deep Web Part II: Shady Deals in the Gray Market

How to Hook the Big Government Fish: Salmon Phishing Revisited

Everybody loved Emily Williams. She was an intelligent, attractive, sexy, young woman. She was a new employee at a government agency and just needed a little help adjusting to her new role. To get this help, she used Facebook and LinkedIn to build connections. She was very successful. In 15 hours, she had 60 friends … Continue reading How to Hook the Big Government Fish: Salmon Phishing Revisited

5 Easy Ways to Lose Important Company Information: Why mobile devices are a hacker’s best friends

If you study malware and hacking long enough, you begin to wonder if there is any system that is safe from attack. You may begin to think that if someone really wants what you have on your computer or in your company files, they will eventually get it. And if you think this way, you … Continue reading 5 Easy Ways to Lose Important Company Information: Why mobile devices are a hacker’s best friends