Published at: 09:08 pm - Friday August 12 2011
#DefCon 19 : Android Network Toolkit for Penetration Testing and Hacking Have an Android and wanna start pwning people, networks and machines like penetration testers do? Defcon 2011 is in full hacking swing, and Itzhak Avraham — “Zuk” for short — and his company Zimperium have unveiled the Android Network Toolkit for easy hacking on the […]
Published at: 08:06 pm - Monday June 13 2011
Over the previous 18 months since discovering the Google Android Platform I have played with many an app from the Google Android Market, all of which were free, out of the many hundreds which I download apart from one which I did delve deep in to my pocket and paid the couple of pound to […]
Published at: 09:11 am - Thursday November 18 2010
In only a few short weeks, Firesheep has captured the attention and interest of hundreds of thousands of people around the world, and has spurred a lot of great discussion. This is the third in a series of posts highlighting and responding to topics I found most interesting. Previous post in series: Idiot Shepherds This […]
Published at: 09:11 am - Thursday November 04 2010
In only one week, Firesheep has captured the attention and interest of hundreds of thousands of people around the world, and has spurred a lot of great discussion. This is the second in a series of posts highlighting and responding to topics I found most interesting. Previous post in series: Ethics and Legality In addition […]
Published at: 09:11 am - Monday November 01 2010
In only one week, Firesheep has captured the attention and interest of hundreds of thousands of people around the world, and has spurred a lot of great discussion. This is the first in a series of posts highlighting and responding to topics I found most interesting. I’ve received hundreds of messages from people who are […]
Published at: 09:10 am - Tuesday October 26 2010
This was certainly an interesting day. As I told TechCrunch: I went back and forth trying to predict what the reaction might be. Initially before Firesheep was completed I thought there might be moderate interest, but then after doing more research found a lot of one-off articles discussing this same issue that were essentially ignored. […]
Published at: 09:10 am - Sunday October 24 2010
When logging into a website you usually start by submitting your username and password. The server then checks to see if an account matching this information exists and if so, replies back to you with a “cookie” which is used by your browser for all subsequent requests. It’s extremely common for websites to protect your […]