My patience has finally been rewarded.  The declassified version of the highly classified election intelligence report has been released and is available to the general public.  The PDF document is short and sweet, but it gives a high level overview of the joint investigation by the NSA, CIA, and FBI into Russian activities and involvement […]

Star Wars fans, let’s be honest here.  All of us at one point or another dreamed of being Boba Fett.  Who doesn’t want a jet pack, a blaster rifle/flame thrower, and an awesome back story?  Not to mention, an inherently bad-ass job.   Even 9 year old Matt was flying his mini version of the […]

In this age of rogue hackers, government red teams, and everyone else under the sun with computer access, a few books, and an MO – what do you count on to keep them out? I tell you many organizations have blurred lines with security products, to the point that incidents are reported and brought to […]

I left college with a decent amount of programming experience, mostly in Java, but never really had an opportunity to actually use it.  Sure, I had an <sarcasm>absolute blast</sarcasm> creating everything from calculators, to red-black trees, to web servers while at school, but I was never really able to apply it to something I found […]

Even if you’re not working in the cyber security field or keep up to date with infosec news, you’ve probably heard of a group called Anonymous.  If you haven’t heard the name, you’ve most likely heard about one of their many news-worthy operations such as Operation KKK, Operation Ice ISIS, or Case Donald Trump.  I […]

The security community has a lot of perks, low unemployment, lots of excitement, new challenges every day, and an endless supply of things to learn. However not everyone likes what we do and not everyone likes to listen to us, ever. There are so many bugs out there that a large amount of us like […]

Apple ends QuickTime for Windows support as 2 high-severity vulnerabilities are disclosed by the Zero Day Initiative (ZDI).

Jeremy Brown gave an awesome presentation at DEFCON 18 about Exploiting SCADA systems. That was almost 7 years ago. Several other industry professionals including my self have given presentations on defending, security, and exploiting these systems. They are all posted online and you can access them for free. All of these talks highlight a common […]

Only one week ago, news media outlets nationwide were locked in coverage of the inevitable face-off between our own government and Apple Inc. On the surface, many felt that the FBI’s request seemed to be the answer; why wouldn’t we want to stop the terrorists? Why not help law enforcement gather additional evidence stored on […]

Human nature is amazing. I can tell you that there are a million stars in the sky and you will believe me. I can tell you that the paint on the wall is wet, and 8 out of 10 people will touch it to make sure. Social engineering and phishing email scams are part of […]