In October 2013 the UK’s National Crime Agency announced that a 28-year old Briton, simultaneously identified by the FBI as “Lauri Love, 28, of Stradishall, England,” was arrested on suspicion of hacking into US Army, US military and US government comp…
BitCrypt Ransomware Easily Broken
A new variant of ransomware dubbed BitCrypt has been smashed open by a pair of French researchers.
Kali Linux Metapackages
One of our goals when developing Kali Linux was to provide multiple metapackages that would allow us to easily install subsets of tools based on their particular needs. Until recently, we only had a handful of these meta packages but we have since expa…
RSA Conference 2014: Intelligence Heavyweights Engage in Friendly Europe Bashing
The US is not unique among nations when it comes to its intelligence gathering abilities. “We are just better” at it than most countries, according to Richard Clarke, the former presidential counter-terrorism adviser.
RSA Conference 2014: Microsoft Does Not Put Backdoors in its Products says Charney
In his keynote at the RSA Conference in San Francisco, February 25 2014, Scott Charney, VP of Microsoft’s Trustworthy Computing Group, insisted that Microsoft has not compromised its principles in order to work with the NSA
RSA 2014: Art Coviello Addresses RSA/NSA Controversy in Keynote
In the opening keynote at the RSA Conference 2014 in San Francisco, Art Coviello, Executive Chairman of RSA, gave his first public comments about RSA’s relationship with the NSA.
Criminals Can Keylog an iPhone to Steal Passwords
Last month, Trustwave’s Neal Hindocha wondered whether cybercriminals could adapt to changes in user habits. In the PC world, a major tool for cyberthieves is the keylogger, used to capture passwords as they are entered at the keyboard. But users are s…
Deep Data Governance
One of the first things to catch my eye this week at RSA was a press release by STEALTHbits on their latest Data Governance release. They’re a long time player in DG and as a former employee, I know them fairly well. And where they’re taking DG is pret…
RSA Conference 2014
I’m at the RSA Conference this week. I considered the point of view that perhaps there’s something to be said for abstaining this year but ultimately my decision to maintain course was based on two premises: (1) RSA didn’t know the NSA had a backdoor w…
80% of SOHO Routers Contain Vulnerabilities
It has become increasingly obvious in recent months that routers are being targeted by attackers – even the NSA uses this attack vector as part of its Quantum Injection program. Now a new survey suggests that as much as 80% of the best-selling SOHO rou…