Posts in Technology News

Windows Subsystem for Linux (WSL) – how to create a Linux hacking toolkit that runs on Windows 10

// August 6th, 2016 // No Comments » // Hacking and Security

Forget running Kali in a virtual machine (well, at least put it aside for a while). The Windows 10 Anniversary Update includes a whack new feature – Windows Subsystem for Linux or WSL. Using the new LxssManager service, WSL lets you run a full-featured Ubuntu Linux subsystem on Windows 10.

Poodlecorp DDoS attack brings down Blizzard’s battle.net servers

// August 2nd, 2016 // No Comments » // Hacking and Security

I tweeted a few hours ago about a DDoS attack hammering Blizzard’s game servers.  Around 7:00 PM Central Time, players in the game began noticing severe lagging.  Within 30 minutes, the Battle.net servers were completely offline and unavailable for game play.

The United States is outsourcing its Cyberspace (Cyber Command) Operations – really?

// November 16th, 2015 // No Comments » // Hacking and Security

It’s a draft title Task Order Request for Cyberspace Operations Support Services in support of United States Cyber Command (USCYBERCOM). Oh, brother. That means the U.S. has bungled their cybersecurity so badly they’re now willing to outsource, and trust, this critical national security task to an outside contractor. Even a partner outside of the U.S. […]

Probe finds that contractors working on military code outsourced some tasks to Russian coders

// November 6th, 2015 // No Comments » // Hacking and Security

After conclusion of a four-year probe, contractors who worked on U.S. military code are being fined a combined $12.75 million. As it turns out, some contractors outsourced coding tasks to Russian. No words can convey the level of stupidity here (hey, let’s get Al-Qaeda to build US airplanes!).

Meet the badass Joint Light Tactical Vehicle (JLTV) – set to replace the Humvee currently used by U.S. military

// November 4th, 2015 // No Comments » // Military

The Joint Light Tactical Vehicle (JLTV) pictured above is the United States military truck set to replace the Humvee currently used by the U.S. Army and U.S. Marines. The Oshkosh was selected on August 25, 2015 and awarded a $6.75 billion contract for 16,901 vehicles to be delivered sometime around 2018 (although we all know […]

Microsoft OneDrive: Let us clarify, when we said “unlimited storage”, we didn’t really mean “unlimited storage”

// November 3rd, 2015 // No Comments » // Internet

Just when I assumed the era of goofy Microsoft business moves was over, they go and do it again. Yesterday Microsoft announced that they were doing away with their unlimited OneDrive storage option. According to Microsoft, some users had abused the “limit” by storing “entire moving collections and DVR recordings”.

Windows 10 – rough around the edges but the future looks bright!

// July 29th, 2015 // No Comments » // Operating Systems

Gotta give props to Microsoft – they did well with Windows 10 both in terms of the design and implementation of the OS and especially the unique rollout via Windows update. I’s obvious that Win10 is going to be a spectacular OS in the future. Why are my comments so forward looking? Because Windows 10, […]

Interesting geographic attack vector from a Russian launched cyber counter-attack

// July 14th, 2015 // No Comments » // Hacking and Security

I love the Russians. I know, strange to hear that from an American in modern day with a new “cold war” (seemingly) beginning to gain steam. Let’s say, I respect them. Their hackers in particular. Their response to a cyberattack is to launch a full-on offensive attack against the attacker, quite a different response from […]

Ouch – US-CERT advisory for this week deals a sharp slap in the face to Adobe

// July 13th, 2015 // No Comments » // Hacking and Security

On the heels of the Hacking Team dump, this week’s US-CERT advisory, a cyber-security bulletin which provides a summary of new security vulnerabilities, was about twice its usual size with all the Adobe Level 10 alerts included in the report. Remind me – why are these products still around?

Are Wild Neutron’s latest attacks related to the zero-day exploit(s) in Hacking Team’s drop?

// July 10th, 2015 // No Comments » // Hacking and Security

Both Kaspersky and Symantec released reports this week pointing out the increase in attacks by Wild Neutron (aka Jripbot, Morpho, or Butterfly). WN had gone mostly dormant (or undetected?) since 2013 after hitting Apple, Facebook, Twitter, and Microsoft using zero-day Java exploits (seeded in the hacked forums of various websites) and the OSX/Pintsized Mac OS […]

14 days running a secret Dark Web pedophile honeypot (and why I now think Tor is the devil)

// July 7th, 2015 // 15 Comments » // Hacking and Security

Before discoursing the lengthy analysis of the Dark Web honeypot (the pedophile honeypot in particular), let’s answer the question that is surely on everyone’s mind – did the honeypot allow me to reveal the true identity of the person visiting the site?

Imagine if we couldn’t report the news. Better yet, imagine you are Barrett Brown.

// January 23rd, 2015 // No Comments » // Hacking and Security

Imagine a cybercrime has occurred. 200 gigabytes of data have been stolen and posted on a remote site. The remote site is public, easily accessible to all. An experienced journalist (Barrett Brown) reports the location of the stolen data.

North Korea’s official full statement regarding the December 2014 Sony attack

// January 3rd, 2015 // No Comments » // Hacking and Security

Below is North Korea’s National Defense Commission’s official statement regarding the December 2014 Sony cyberattack – grammar and spelling errors left intact. The statement was published on December 22, 2014 by the country’s official news agency, KCNA. I’ve highlighted all the interesting (and humorous) parts.

US-CERT releases details on SMB worm tool used in Sony attack- complete breakdown

// December 19th, 2014 // No Comments » // Hacking and Security

US-CERT released alert TA14-353A today detailing a “SMB Worm Tool” recently used by cyber threat actors against a “major entertainment company”. Given the timing of the US formal accusations against North Korea, this certainly hints that the malware toolset being referenced is the one used by the Guardians of Peace (GOP) in the recent Sony […]

Anonymous fights fire with fire – threatens attacks against Sony (and others?) if The Interview is not released

// December 19th, 2014 // No Comments » // Hacking and Security

Anonymous Logo

In an odd but not totally unexpected twist to the story, a hacking group claiming to represent Anonymous has threatened Sony with the same type of bitch slap they got from [cough] North Korea’s GOP if the movie The Interview is not released as planned. This was followed by other messages from a poster claiming […]

FBI releases official update on Sony Investigation – officially confirms North Korea involvement in attack against Sony

// December 19th, 2014 // No Comments » // Hacking and Security

The following just went across the wire, released by the FBI, in which they “concluded that the North Korean government is responsible” for the attack and leak of Sony Pictures Entertainment data. The FBI based their conclusion on similarities in attack code and “infrastructure” previously tied to North Korea and threw down the gauntlet stating, […]