“I’d Rather Go Naked” Spyware vs. Spy Wear: Emergence of RFID Microchips in Clothing In part 1 of our story, we discussed how clothing manufacturers have started to embed RFID microchips into their apparel. These chips are sensors that cannot be turned off and — with readily available readers — can be used to track information about the consumer…
Category: Cyber-Crime
RFID Microchips in Clothing (Part 1)
They say “Clothes make the man”…what happens when “Clothes reveal everything about the man?” The Emergence of RFID Microchips in Clothing (Part 1) Imagine walking into a store you have never previously visited and a clerk walks up to you and asks, “How are those size 36 Dockers pants working out for you? Would you…
Mr. Robot’s Black Hat Bag of Tricks
Note: For all you Mr. Robot fans like myself who were looking forward to tonight’s Season Finale, bad news: 1 Update on 8/26/2015 at 5:01 p.m. ET: The season finale of Mr. Robot was scheduled to air tonight at 10 p.m. ET, but USA Networks announced just before 5 p.m. that it was holding the…
Rape Prevention: Understanding Personal Location Data on “Dating” Apps
Whether you are a female CO or have one in your life that you care about, this is very important information..the Predators out there are getting smarter and using cyber tools more and more to track, stalk and eventually rape or murder young women all over this nation. Knowledge is Power, let’s start using it….
I Always Feel Like Somebody’s Watching Me…
Your Watch is Watching you. Who is Watching Your Watch? Not Worried About the Internet of Things? Well You Just Became a Part of It. As more and more “things” that you interact with every day become hooked into the internet, you leave a permanent trail of digital exhaust that enables hackers and government agencies…
Russians Hacked Joint Chiefs of Staff
Investigators say they believe the same Russian hackers that carried out attacks on the White House and State Department last year and the attempted penetration of the Pentagon last month were responsible for a major cyberattack that shut down the Joint Chiefs of Staff email for the past 11 days, The Daily Beast has…
Going Grey: The TOR Browser
**Authors Note:This is the first in a series of articles that will cover different tradecraft involving staying anonymous and “off the radar” as much as possible. No tricks here..just goo ole’ fashioned common sense combined with a touch of technology here and there.** Since I come to the conclusion there is no such…
Hackers can Disable a Sniper Rifle-or Change it’s Target
Welcome to the 5th Dimension of Warfare gents. We know about Sea, Air, Land and Space, now we get to truly be one of the first Generations to see how War plays out in the 5th Cyber Arena….Scary? You Bet your Ass. But if you take only one thing away from this article, don’t let…
We Are All Big Brother Now
This article presents an interesting question…in a world where connectivity and constant surveillance are a given, where is the line drawn in who is REALLY Big Brother? By exposing the wrongs of police and politicians, video-phone democracy is reinventing freedom. But is this just another form of mob rule? By MICHAEL HIRSH July 23, 2015…
Shooting Holes in the Willy Wonka “Golden Encryption Key” Myth
In response to a recent article in Motherboard, Mr. A had this to say…. This article gets it right, but fails to point out the motivations behind the ‘golden key’. First, the idea of a ‘golden key’ is a decryption backdoor key that only the government would possess. This, we are told, is necessary…
