MailChimp accounts hacked to spam out malicious emails

Let me start with some full disclosure: I pay MailChimp a decent wedge of cash each month to send out newsletters to readers of my personal blog, and I’m quite a fan. Sending email to a large number of people reliably can be fraught with problems, and I would rather spend my time creating useful … More MailChimp accounts hacked to spam out malicious emails

Adobe fined $1 million for 2013 data breach

The financial repercussions of a data breach have been highlighted by the $1 million fine handed out to Adobe Systems for a 2013 security incident. Roy Cooper, attorney general of North Carolina, said that businesses and government “must do more” to protect sensitive data from getting into the hands of cybercriminals. The 2013 data breach … More Adobe fined $1 million for 2013 data breach

Secure your router: How to help prevent the next internet takedown

Who knows what evil lurks in the hearts of webcams? After the Dyn DDoS last month, this is a question on the minds of a lot of security people. Someone recently asked me if we shouldn’t adopt a new name for the Internet of Things (IoT) because the existing term is too vague. I responded … More Secure your router: How to help prevent the next internet takedown

I can see your texts: SMS/messaging clients, security, and privacy

My mother text me the other day about cycling and performance components. No one other than myself really wants to read that. Looking at the multitude of different types of SMS users out there, however, there is a very high probability that there is someone who wants to read or gain access to another user’s … More I can see your texts: SMS/messaging clients, security, and privacy

10 gadgets every white hat hacker needs in their toolkit

Sometimes, during security audits, we may encounter a situation where everything is being managed correctly. In other words security patches, policies, network segmentation, antivirus, and user awareness, to name just a few measures, are being applied properly. That’s when, in order to continue the analysis from the perspective of a security researcher or consultant, social engineering and a … More 10 gadgets every white hat hacker needs in their toolkit