Categories

Posts by Jean Taggart

Senior Security Researcher at Malwarebytes. Incorrigible technophile who loves to break stuff. Habitually voids warranties on brand new stuff. Custom is the norm, never the exception.

GPS Tracking on the Cheap Part Two

The Tile, a small tag that can send GPS signals to your phone to inform you where your lost keys are, might be too big and expensive to use as a full-fledged tracker, but in comes the I’m Here.

Why you shouldn’t connect to just any access point

The convenience of connecting to a free WiFi hotspot holds unknown dangers such as connecting to a rogue access point where all your info can be accessed by a third party.

Some businesses are already banning Google Glass on their premises, and people are voicing concerns over their privacy, as they have recording capabilities. But what other potential dangers are out there?

Prison Door Glitch or Open Sesame Hack?

In a scene straight out of a movie, a Florida prison suffered what they are presently calling a “computer glitch.”

Lock – Unlock, Biometrics Failure

Signwave Unlock free by Battelle on the Leap Motion controller not quite ready from prime time yet.

More on Subverting Automotive Computing Systems

A deeper look into vehicle “hacking” and how they can endanger the life of the operator and occupants.

As motor vehicles advance technologically, they incorporate more and more computers, hacking cars isn’t all that far fetched.

Bi-Directional Trickery, (╯°□°)╯︵ oןɹ

Malware authors are known to try various obfuscation techniques in order to hide their malware. The Unicode Right-to-Left trick (RLO), which has been known for quite some time, has been reported again by security firm F-Secure, showing its resurgence.

Tracking devices are not a new thing, but what if you took that same technology to finding your keys or your stolen bike? The ability to track down missing/stolen property isn’t new. Showing up at the doorstep of a bike thief’s house is.

Hello Moto, do you really need all this info?

During testing, a significant amount of a security professional’s information is being sent by his older Motorola Droid x2 handset to an external server. Even more troubling is that some of this information is sent “in clear”, as in not encrypted.

Revisiting Geolocation Metadata In Our Toys

Many people do not know that this hidden metadata exists. If you take a picture with a device, then post it to a social network, you could be unwittingly advertising your exact location.

Scammers use psychological manipulation to defraud their victims. Learn how to better protect yourself and avoid scams — even ones you’ve never heard of.

« Previous Page

Subscribe to our YouTube Channel