Posts in News

Rule 41 changes pass – long live legalized electronic eavesdropping of all Americans!

// November 30th, 2016 // No Comments » // Hacking and Security

The new Rule 41 dictate is going to be law and it’s a doozy, both mind-boggling (for its stupidity) and stomach-churning (for its stupidity) at the same time. Effectively, what the law does is allow any judge, anywhere (including Podunk, Texas), to grant a warrant for electronic surveillance of any US citizen. If you thought […]

Trump minions fight back with combo Sieg-Heil-Trump parade and George Soros protest in locations across the US

// November 16th, 2016 // No Comments » // Politics and legal

They’re calling themselves a part of Anonymous and to prove they’re a lot smarter than the Alt-Righters, threw up a Dox of George Soros (who they say funds Occupy Wall Street, Black Lives Matter, etc.). Turns out the “Dox” was nothing more than a nifty little bio (see below). Today they announced a “nationwide Trump […]

Here’s all you need to know about the dangerous Alt-Right movement – straight from the Breitbart (Stephen Bannon’s) published manifesto

// November 14th, 2016 // No Comments » // Politics and legal

In early 2016, Brietbart News published an explanation of their Alt-Right movement. It attempted to defend and justify the Alt-Rights rhetoric. Let’s take a trip through the manifesto, with quotes directly taken from Breitbart’s published philosophy, and untangle the purple prose to reveal what the Breitbart’s “brainy” Alt-Right really believe.

Anonymous posts message clarifying stance and denouncing Julan Assange, Vladimir Putin, and Donald Trump as fascists

// November 14th, 2016 // No Comments » // Politics and legal

The following appeared on Pastebin yesterday: Anonymous message on Wikileaks & the rise of Trump and global fascism.

Why are students at Texas State University dying to have a good time (while officials ignore the elephant in the room)

// November 4th, 2016 // No Comments » // Politics and legal

Conveniently situated off I-35, splitting the authority of Hays County and Guadalupe County, the campus sits near San Marcos River and Guadalupe River – both popular party destinations for students of an age when rational adult-like decision-making is just beginning to take root. Being a “party school” may be a good draw for the local […]

The Shadow Brokers dropped another server list today–is it relevant?

// October 31st, 2016 // No Comments » // Hacking and Security

The Shadow Brokers published another encrypted drop today on Medium which they say reveals NSA IP addresses linked to the Equation Group (some believe Equation Group is a NSA hacking cooperative). TSB’s drop uses the same PGP as previous drops so it appears to be legit.

Why we should fear Mirai and IoT botnets (and how stupidly simple it is to quash those fears)

// October 24th, 2016 // No Comments » // Hacking and Security

The first thought for anyone who has examined the Mirai codebase is how well the application was coded. The second thought is how easy it would be to disable. Being a C&C server inherently means you can control the Mirai botnet with it – even to the point of shutting it down – permanently.

If you own a D-Link router, stomp it, burn it, and never buy D-Link again

// September 30th, 2016 // No Comments » // Hacking and Security

Maybe other router manufacturers are as magnificently dumb as D-Link but regardless, get rid of all D-Link routers and vow to never buy another D-Link product for a long as your lungs suck in air. The security vulnerabilities present in their devices, especially the DWR-932B router, are so far beyond stupid, well, you’d swear the […]

Well, that didn’t last long – DDoS record broken again with 990Gbps flood

// September 28th, 2016 // No Comments » // Hacking and Security

Just a week after Brian Krebs was hit with a 620Gbps IoT attack, reports are hitting the wires that OVH has been hit with an even larger attack – two simultaneous barrages of 799Gbps and 191Gbps for a whopping 990Gbps total. And this may only be the beginning…

Akamai’s decision to drop Krebs’ DDoS protection wasn’t an infrastructure thing – yeah, right

// September 26th, 2016 // No Comments » // Hacking and Security

I wasn’t too happy to hear that Akamai dropped security researcher/writer Brian Krebs last week after Kreb’s website sustained the largest-ever DDoS attack. In short, they basically offered Krebs protection from DDoS attacks until, well, they said they couldn’t. Then they dropped him leaving Krebs to fend for himself.

Security researcher Brian Krebs’ website hit with largest ever DDoS attack – 665 Gbps!

// September 21st, 2016 // No Comments » // Hacking and Security

Security researcher Brian Krebs of KrebsOnSecurity reported today that his site was hit with a walloping 665 Gbps DDoS attack. The attack included SYN and HTTP floods and peaked at 153 Mpps (million packets per second). Krebs’ site remained online, the attack mitigated by Akami’s DDoS protection service.

How to tell if you’re on a government watchlist (and how to get on and off the wild ride)

// September 21st, 2016 // No Comments » // Hacking and Security

People often wonder if their names have somehow made it to the “the list”, that watchlist of US citizens whom the government suspects may be up to something. I would venture to say, the best way to know if you’re on the watchlist would be to recognize how often you find yourself forced into unique […]

WTF, I just found this racist Halloween mask depicting a black man on Amazon

// September 21st, 2016 // No Comments » // News

I was searching for lifelike mice on Amazon today (long story) and found this unbelievably racist Halloween mask of a black man. Tiny ears, white eyes, big lips – just like the racist cartoons of the 50’s. My gut reaction was shock and I began to wonder how the seller would justify placing an item […]

A day in the life of a Bug Bounty hunter – demo of productive hacking session against Yelp

// September 9th, 2016 // No Comments » // Hacking and Security

Offering bounties worth thousands, even millions of dollars, bug bounties pay hackers to report vulnerabilities. The process is pretty simple. The hacker sends the vulnerability report to the company, the company patches the vulnerably, the bounty paid, and finally, the vulnerability disclosed. Everyone wins. Usually.

Calm down everyone – Samsung’s not going to make you send your Note 7 back for repairs.

// September 2nd, 2016 // No Comments » // Mobile

The Samsung Note 7 battery problem is indeed a major blow but not unheard of. Samsung will recover and in fact, there are already rumors they’ve ramped up customer service to save face. Still, with Apple’s new iPhone 7 coming out in mere weeks, the battery grenade problem couldn’t have happened at a more inopportune […]

Who’s really behind the DNC/NSA hacks? Russia, Snowden, independent hacker, or hybrid of all three?

// August 17th, 2016 // No Comments » // Hacking and Security

Regardless of whether you consider Edward Snowden’s leaks of classified information to be self-sacrificial acts of patriotism or the deeds of a traitor, the recent DNC data dump and NSA cyber weapons malware (milware?) code drops have all the markings of a Snowden escapade. If you disagree, consider the timing of the code drop and […]