Industrial Espionage in practice
Earlier this year I caught a cleaner with its hands in the cookie jar. Dumpster diving photographic evidence is here, here and here. Read my full report
Private homepage of Alexander Geschonneck (Berlin, Germany).
Earlier this year I caught a cleaner with its hands in the cookie jar. Dumpster diving photographic evidence is here, here and here. Read my full report
According to TIMES a fraudster outwitted sophisticated banking security systems by using an ordinary MP3 music player to bug cash machines and steal customers’ credit card secrets.
Thierry Zoller and Kevin Finistere gave a presentation in the Hack.lu 2006 conference on Bluetooth Cracking. They also showed a demo of BTCrack, a Windows tool that can crack Bluetooth PIN and Linkkey in almost real-time. All you need is
Mikko from F-Secure made a quick research on the domain name market. They made some searches on Sedo.com and found out that they are reselling domains like chasebank-online.com, citi-bank.com and bankofameriuca.com. According to Mikko and Sedo are more obviously fraudulent domains available,
Bruce Schneiers announced in his blog that BT (aka British Telecom) has acquired Counterpane Internet Security, Inc. Ok, so far so good. But in a blog comment Carlo Graziani told the „real“ storybehind this deal. Verry funny.:cool: Bruce himself voted this comment for „Best blog comment ever.“
I saw some interesting articles about the old problem with default passwords on IT systems combined with the new problem that the manufactur published it on the internet. In this case we are speaking about ATM’s. Got cash? 😉
Reuters reported, that a General Electric laptop containing the names and Social Security numbers of 50,000 current and former employees was stolen in early September. The laptop, issued to a GE official who was authorized to have the data, was stolen from a locked hotel room, the company said.
Charlie Paglee recently published on his blog, that the a chinese company successfully reverse engineered the Skype protocol! 😯
The Internet Security Zone Blog published an interesting article about the FBI forensic analysis of the stolen veteran’s administration laptop that
More details on the Greek wiretapping issue are emerging. Bruce Schneier wrote in his blog, that it turns out that the „malicious code“ was actually code designed into the system and that the attackers managed to bypass the authorization mechanisms of the eavesdropping system, and activate the „lawful interception“ module in the mobile network. They Read More …
Sie sehen gerade einen Platzhalterinhalt von Facebook. Um auf den eigentlichen Inhalt zuzugreifen, klicken Sie auf die Schaltfläche unten. Bitte beachten Sie, dass dabei Daten an Drittanbieter weitergegeben werden.
Mehr InformationenSie sehen gerade einen Platzhalterinhalt von Instagram. Um auf den eigentlichen Inhalt zuzugreifen, klicken Sie auf die Schaltfläche unten. Bitte beachten Sie, dass dabei Daten an Drittanbieter weitergegeben werden.
Mehr InformationenSie sehen gerade einen Platzhalterinhalt von X. Um auf den eigentlichen Inhalt zuzugreifen, klicken Sie auf die Schaltfläche unten. Bitte beachten Sie, dass dabei Daten an Drittanbieter weitergegeben werden.
Mehr Informationen