Shodan
Targeted Attacks Part 1 – OSINT and Reconnaissance
In our August monthly episode we start our three part series on targeted attacks. In this episode we focus on OSINT (Open Source Intelligence) and reconnaissance techniques used by attackers in phishing ...
Shodan Safari: The Heckling
via Zack Whittaker, writing at TechCrunch, comes this superb reportage tackling an amusing new psuedo-game using Shodan output as the source platform to feed a Twitter feed monikered Shodan Safari. In which, ...
Security Boulevard’s 5 Most Read Stories for the Week, August 06-10
A new week, a new crop of security stories. Last week, U.S. Military ‘Reaper Drone’ Designs, Eavesdropping on mobile devices, Making security priority and Multifactor authentication adoption made the headlines. In addition, ...
For Sale: U.S. Military ‘Reaper Drone’ Designs
A recent hack of an Air Force captain assigned to the 432nd Aircraft Maintenance Squadron at Creech Air Force Base, Nevada, and the subsequent offer for sale of the “Reaper Drone” design ...

