21 Jul 2013

Apple’s Development Center Breached by Hackers

Apple’s Dev Center went down on Thursday causing issues for developers around the world. The system remained down for three days and is still currently unavailable. Many developers began suspecting a security incident after many received unauthorized password change emails on their accounts. An hour ago developers finally received a

26 Apr 2013

Security Visualization: VideoLAN DDoS Visualized As A Game of Pong

VideoLan was the target of a recent DDoS attack with more than 200 requests per second hitting their systems at 30Gbps. VideoLAN is experiencing a major DDOS attack targeting its mirrors infrastructure. — Ludovic Fauvet (@etixxx) April 23, 2013 We've seen more than 200 downloads of VLC per seconds during the

20 Dec 2012

Penetration Testing with Smartphones Part 2: Session Hi-Jacking & ARP Spoofing

In the first part of this series “Penetration Testing with Smartphones Part 1” we covered several network and vulnerability scanning applications that can be run from a smartphone. In this section we will be covering some additional tools for Wi-Fi sniffing, session hi-jacking and ARP spoofing. Disclaimer:This article is for

30 Nov 2012

Penetration Testing with Smartphones Part 1

When most people think of penetration testing, they think of a simulated external attack where the tester tries to break into a network remotely. Companies focus most of the security spending and policies on keeping hackers out remotely, from firewalls and other security hardening appliances, software and tools. However, given the proliferation

14 Sep 2012

Fifty Shades of Grey Hat: Hacking & Ethics

Over the summer attended and presented at several security conferences including Black Hat, Security B Sides and ToorCamp.  When I  explain the conferences and activities such as penetration testing and lock picking to those outside of the security community, I get a similar responses such as “isn’t that illegal?”  When