Tag: Hacking

  • Perlroth, Terminology, and Hyperbole

    I finished reading “This Is How They Tell Me The World Ends” by Nicole Perlroth a few weeks ago but haven’t had time to write this blog, and likely another, based on specific aspects of the book. I have written two blogs on topics covered in the book after reading it already, but both written…

  • 2013 Superdome Outage a Hack? The Value of Post-Incident Investigations.

    [This was originally published on the OSVDB blog.] As we approach the pinnacle of U.S. sportsball, I am reminded of the complete scandal from a past Superbowl. No, not the obviously-setup wardrobe malfunction scandal. No, not the one where we might have been subjected to a pre-recorded half-time show. The one in 2013 where hackers…

  • Defacement-Commentary Address

    [This was originally published on attrition.org.] “CyberWar Rages in the Middle East!!! YOUR Servers could be next!!!“ This is the kind of crap coming out of so-called security companies and news media lately. The real irony is that they are using data from the Attrition web defacement mirror to support their hyped conclusions. Let’s take…

  • Convict them all! A new breed of ambulance chasers

    [This is a rebuttal/rant in which I ‘reply’ to various parts of a news article, originally published on attrition.org. This version has been updated for style.] Computer crime: Changing the public’s perception12 Oct 2000https://seclists.org/isn/2000/Oct/51 You remember Jonathan James? He made national news a couple of weeks ago. You know, he’s that nice 16-year-old young man…

  • Hacking: A Game for the 90’s?

    [This was originally published in Ex-Game Vol 1, a print magazine in Japan. Exact publish date not known, just the year.] Friday night, you’ve been at it for three hours. Typing away at your computer, hitting one web site after another. Every ten minutes that passes, some large corporate network’s web page has been replaced…

  • Securing your network; Your startup’s survival depends on it

    [This was originally published on IBM Developer Works and is mirrored on attrition.org.] Collecting customer demographics is good, and collecting payments online is good. But it isn’t good if this information is stolen from your company’s computers. Brian Martin examines how — and how often — this really happens, and what you can do to…

  • CERT Rides the Short Bus

    [This was originally published on attrition.org.] One of the resources Attrition.org provides is mirroring defaced web pages. One of the related services is running three mail lists revolving around defaced web pages. We offer three different mail lists to accommodate people wishing to stay abreast of the latest defacements: defaced – this list receives one…

  • “It Is Good Beating Proud Folks..”

    [This was originally published on attrition.org.] “It is good beating proud folks, for they will not complain“ William Knowles pointed me to www.realspy.com today, as they had apparently changed their web page after a recent defacement. Below is the message currently up on their server: Due to hackers rewriting my pages from others websites, we will be…

  • Ex-Game: (Untitled)

    [This was the second article I did for Ex-Game magazine (print mag in Japan). It was titled as my name and labeled “Original Document”. It was subsequently mirrored on attrition.org.] In the past few years, Japan has seen very few incidents of web sites being defaced. From 1995 to January of 2000, there were only…

  • Placing the Blame

    This was originally published on Newstrolls and subsequently mirrored on attrition.org.] As I type this article, there is a significant effort under way to track down two individuals. Both “Maxus” and “Curador” are wanted by several law enforcement agencies, most notably the Federal Bureau of Investigation (FBI). Each person has committed a crime involving unauthorized computer access.…