There’s something to be said when sacrifices are made for the greater good. At least that’s what the Department of Justice wants us to think. To avoid having to expose the details in court of a Tor exploit used by the DOJ to snag a child pornography site, the department motioned to dismiss the indictment. I’m not sure how I feel about this. Part of me wants to think that the ‘greater good’ is worth it and that this child porn ring will be shut down eventually anyway. On the other hand, after knowing what our government hackers are capable of, it’s hard to think that the greater good really has anything to do with it. The Tor network can be used for harboring child pornography, but it’s also be used in foreign countries be freedom fighters who work against repressive regimes (think North Korea). Read More →
More than 1 million Yahoo and Gmail accounts – including usernames, email addresses and plain text passwords – are reportedly for sale on the dark web.
According to the dark web vendor SunTzu583, who posted the sale offer, he has 100,000 Yahoo accounts from the 2012 Last.fm data breach and 145,000 Yahoo accounts from the 2013 Adobe breach and 2008 MySpace hack. The accounts are on sale for between 0.0079 bitcoins and 0.0102 bitcoins each. Read More →
Recently I was driving home from work looking forward to an evening of relaxation when I happened to glance down and see my vehicle’s check engine light brightly lit, staring back at me. Most of us have been in this situation at least once. There’s that sudden panic wondering if the car is even going to make it to your destination. Then there’s the panic when you think about how much money it’s going to cost to fix. And you don’t even know what’s wrong yet! Read More →
At first thought, it might seem impossible to pull data from a computer that’s not connected to the Internet. How can a system be hacked without a Read More →
The Internet of Things and all of it’s ‘Things’
The Internet of Things is the collection of physical devices connected to the Internet for control and feedback purposes. We have long passed the age where the only things connected to the Internet were computers and smartphones. Modern homes can have a myriad of objects connected to or accessible from the Internet. Smart TVs, video game consoles, thermostats, door locks, vehicles, even Read More →