Hackers

Slow Down! You’re in a Public Environment

These days, if you’re planning to spend time at an airport terminal or a coffee shop – it’s likely that you’ll look for a public Wi-Fi hotspot to connect to, and perhaps a charging station, to make sure you don’t run out of power. While our distraction level is  high when we’re out and about…

The Patient Hacker

It was not that many years ago that a successful security breach was based on speed. The hacker would perform reconnaissance to find the weak point in an organization’s defenses and use that as a vector to launch the attack. The attack would overwhelm resources, and before a meaningful defense could be launched by the…

Understanding & Detecting Backoff POS Malware

Point of Sale (POS) malware has had its share of headlines this year. Now with the holiday shopping season underway POS systems will certainly be an enticing target for hackers to explore due to the payoff of thousands of fresh credit card numbers that will be run through these devices. “Backoff” is part of a…

Beautiful Women Make for Excellent Hackers

There’s nothing particularly revelatory in saying women hold certain powers of persuasion over men. Odysseus was nearly shipwrecked by beckoning Sirens, St. John the Baptist was beheaded at the request of a gyrating Salomé, and I, in third grade, gave some of the more prized Beanie Babies in my collection to Shawna Jones because she…