Archive for August, 2015


Recently, WeipTech was analyzing suspicious Apple iOS tweaks reported by users and found over 225,000 valid Apple accounts with passwords stored on a server. Continue reading

Defense Secretary Ashton Carter

Foreign spy services, especially in China and Russia, are aggressively aggregating and cross-indexing hacked U.S. computer databases — including security clearance applications, airline records and medical insurance forms — to identify U.S. intelligence officers and agents, U.S. officials said. Continue reading


We’re back to look inside the crystal ball of future technologies. This is the third post of the “FuTuRology” project, a blog series where the Trend Micro Forward-Looking Threat Research (FTR) team predicts the future of popular technologies. Continue reading

Up to now, there have been relatively few laws or regulations from government agencies that mandate just how companies should protect their data. In the United States, however, that may be about to change. Continue reading

The security industry loves to talk about how “sophisticated” attacks can be. Usually this takes the form of us saying how advanced and sophisticated an attack is, what new methods were used to hide servers or make analysis harder, etcetera. However, it’s easy to forget that not all attacks need to be technically sophisticated; instead it can be in the social engineering used and how the attack is carried out.

Continue reading

A screenshot of the decompiled java for App.class

Google’s security team recently identified a new domain masquerading as an official EFF site as part of a targeted malware campaign. That domain,, is designed to trick users into a false sense of trust and it appears to have been used in a spear phishing attack, though it is unclear who the intended targets were. Continue reading


Pirates have found a way to circumvent the 4K copy protection on Netflix, resulting in the first ultra high-definition leak. A copy of the first episode of Breaking Bad worth nearly 18 gigabytes is currently being traded on various torrent sites and more leaks are expected to appear in the future. Continue reading

The Plan
When the Ashley Madison database first got dumped, there was an interesting contingent of researchers talking about how pointless it would be to crack the passwords, since Ashley Madison was using salted bcrypt with a cost of 12.  I thought it might be a fun experiment to run the hashes on a cracking rig of mine to see what I could actually get out of it. Continue reading

zu-launchpad-july-20, a site that helps married people cheat and whose slogan is “Life is Short, have an Affair,” recently put up a half million (Canadian) dollar bounty for information leading to the arrest and prosecution of the Impact Team — the name chosen by the hacker(s) who recently leaked data on more than 30 million Ashley Madison users. Here is the first of likely several posts examining individuals who appear to be closely connected to this attack. Continue reading

Raspberry Pi Official Case

Kids don’t want to code. They want to solve problems us oldies can’t perceive

Continue reading