SpiderOak Takes Novel Approach To Data Privacy

Saturday, August 3rd, 2013

Ethan Oberman has a problem with cloud computing. "A person should be able to use cloud technologies without relinquishing his or her privacy," explained Oberman, CEO of cloud storage service SpiderOak, in a phone interview. Given Internet companies that rely on mining data about users for revenue, government agencies that have the ...

Brute-Force Attacks Explained: How All Encryption is Vulnerable

Saturday, July 6th, 2013

Brute-force attacks are fairly simple to understand, but difficult to protect against. Encryption is math, and as computers become faster at math, they become faster at trying all the solutions and seeing which one fits. These attacks can be used against any type of encryption, with varying degrees of success. Brute-force attacks ...

Use Splunk to show your active netstat connections, geographically

Friday, July 5th, 2013

I was geeking out a bit tonight thinking about a friend's situation and thought that I could probably do something useful in Splunk that might be helpful to others.  Sure enough, a few minutes later and I am viewing all my active netstat connections geographically as they are established:   Once the ...

AutoIT makes malware “outrageously easy”

Tuesday, May 7th, 2013

Security firm Trend Micro has seen an uptick in AutoIT-based malware thanks to the fact that it’s an easy-to-learn language that allows for quick development. It enables everything from simple scripts that change text files to scripts that perform mass downloads with complex GUIs. One commonly seen nefarious AutoIT tool ...

What’s in a Password?

Tuesday, April 30th, 2013

Nearly every week now we can read about a data breach case somewhere, where millions of user accounts and potential other sensitive data has been compromised. Most people are not even shocked by such news anymore, as it is starting to become humdrum. One of the most common attacks used in ...