Security

Luke Kapustka - Protecting your security and privacy

Password Reuse is a Terrible Idea

“76 percent of employees at the world’s largest companies reuse passwords across personal and professional accounts” –Chip Witt, SpyCloud I found this on Help Net Security and it is a statistic I’ve been seeking for some time. Let me tell you why that is a problem from several angles. Password reuse is the tendency for Read more about Password Reuse is a Terrible Idea[…]

Crowdsourced penetration testing

Bugcrowd, for anyone not familiar, is a managed crowdsourced bug bounty service. They’re getting into penetration testing and released a report to sell the benefits of this service versus traditional penetration testing. The report is found here. Disclaimer: I am a penetration tester, and admit some bias. I have some limited experimented with bug bounties. Read more about Crowdsourced penetration testing[…]

The Internet of Risky Things

I’ve resisted as long as I could. It’s futile. My home, and likely yours, has been slowing filling with small, internet connected devices. These include voice-controlled smart speakers like the Amazon Alexa, Google Home, appliances, smart thermostats, cameras, smart light bulbs, smart plugs, smart everything. They’re called “internet of things” or IoT for short. Yet, Read more about The Internet of Risky Things[…]

Will the Real Malware Culprit Please Stand Up?

The trouble with attribution During the 2018 winter Olympics in South Korea, there was an attack on various computer and network systems. This all occurred before the opening ceremony and it effected services like ski lifts, the Olympics website, Wi-Fi networks, and random display boards used to inform athletes and guests. Malicious software (malware) named Read more about Will the Real Malware Culprit Please Stand Up?[…]

Cryptojacking: Hijacking Your Computer Power for Profit

 The rise of cryptojacking There is a rising trend called crytptojacking. The bad guys are taking advantage of your computer, phone, or servers on the internet to run huge calculations. These are used to mine cryptocurrency. These can then be exchanged for tangible currency. Some predict that the trend is rising so quickly that it Read more about Cryptojacking: Hijacking Your Computer Power for Profit[…]

Who Owns Your Information?

A journey through the business of collecting information Recently, I found an email in my spam folder. It promoted a service contract for a vehicle that I owned a few years ago. For mere mortals, the delete button solves this annoyance. Instead, I dug in and will share some things about the collection, privacy, and Read more about Who Owns Your Information?[…]