Subscribe: Hacker's Blog
http://www.erichacker.com/feed
Preview: Hacker's Blog

Hacker’s Blog



Like we really needed this.



Last Build Date: Tue, 18 Aug 2015 11:01:49 +0000

 



SecureWorld is insecure?

Tue, 18 Aug 2015 11:01:49 +0000

Since I have my own domain, I can give out email addresses that are tagged to an organization. If I receive a malicious email or spam on that address, then I know that that address has leaked somehow. Attribution only goes so far though, as some organizations will sell or distribute the email to others. […]



Rational Security: Security Innovation?

Wed, 15 Aug 2007 13:50:13 +0000

Some people think that they are the lunatic fringe. Mr Hoff states: Nobody really believes that security can be innovative, do they? I do. The next thing we’ll be hearing is that rational security = security innovation or to simplify: Rational = Innovation. What could be further from lunacy? Quite simply, in a changing environment […]



CamZak.com / Google hack: Stop spam with ‘Infinite’ e-mail addresses with GMail

Sat, 25 Mar 2006 23:54:27 +0000

Interesting approach to tracking how spammer’s have found your address if you have a gmail account, though it does have a flaw. CamZak.com / Google hack: Stop spam with ‘Infinite’ e-mail addresses with GMail I have been doing something similar for years with my own domain and a catch-all address. Of course, having a catch-all […]



David Adams’ MobileStartup.com: Now they’re gluing the SIM cards in!

Wed, 08 Mar 2006 18:25:01 +0000

This is just too funny to pass up. David Adams’ MobileStartup.com: Now they’re gluing the SIM cards in! There is nothing more I can add to Mr. Adams insghtful analysis.



Frankly Common Insecurity – Computerworld

Tue, 28 Feb 2006 14:16:43 +0000

Let me begin by saying that I have a deep respect for Frank Hayes understanding of general IT issues. However, Mr. Hayes just doesn’t get security as seen again in Common Insecurity. Mr. Hayes suggests that virtualization would have helped separate the data frrom the three different agencies so that a breach of one would […]



They just don’t get it: N.H. Breach May Have Exposed Credit Card Data – Computerworld

Tue, 28 Feb 2006 13:49:11 +0000

I suppose it’s too much to ask for organizations who have weak security programs to understand real risk. Here is a fine example, a Security swiss army knife like tool was found on a server that processed Credit Card transactions. So what do we do? Panic! N.H. Breach May Have Exposed Credit Card Data – […]



Security Awareness and Spear Phishing

Sat, 18 Feb 2006 21:50:34 +0000

Sometimes I am drawn into irony like a gawker to a highway accident. I know I should just focus on the road and keep moving, but I just can’t help to stop and look. Today’s ironic  accident was my employer’s quarterly security awareness newsletter. I’m sure they tried really hard, but the system just conspired […]



Communications experts warn of VoIP security issues

Fri, 03 Feb 2006 02:23:40 +0000

I always find it interesting when academics rant about some security issue that really isn’t tied to reality. Communications experts warn of VoIP security issues. Upon reading the news brief it is apparent that VoIP is not the issue, it’s DDOS and the lack of controls on our peer to peer Internet. At first I […]



The sky is falling! Virtually

Mon, 30 Jan 2006 21:32:33 +0000

Late last year VMWare released a very cool new tool called the VMWare player. There are now so many cool things that one can do with VMWare that it boggles the mind. Of course a lot of them are big security problems. Big enough to make the whole USB Drive/ipods are evil scare a while […]



Real Security – A different perspective about information security

Thu, 26 Jan 2006 19:35:51 +0000

Wow, one of my security heroes has a blog and it looks a whole lot better than mine. Real Security – A different perspective about information security This reminds me that I really need to keep in tough with people better. Hopefully, once again, I’ll be borrowing from Jim to make myself look competent. This […]