top of page
Search
ghostexodusfreelan2
Oct 1, 20247 min read
WiFi Pineapple: a WiFi attacker’s pocket-sized superweapon
What you’re about to read is an expansion of an earlier article I wrote, ‘The powerful cyberweapons that can fit in your pocket.’ In this...
40
ghostexodusfreelan2
Jul 19, 20246 min read
Hackers and law enforcement: to be or not to be?
Hackers and law enforcement have a colorful history. Pick any decade, and it’s chock-full of arrests and heavy-handed prosecutions, which...
100
ghostexodusfreelan2
Dec 24, 20234 min read
Facebook and the fight for #opchildsafety
When the news broke on Wednesday, December 6th, that Facebook (Meta) and its offshoot Instagram were finally being served with a lawsuit...
290
ghostexodusfreelan2
Dec 24, 20235 min read
The psychology of internet trolls
Trolling is a form of cyberbullying. It involves posting malicious or harassing comments on social media platforms to hurt or humiliate...
360
ghostexodusfreelan2
Nov 20, 20239 min read
Exclusive: OSINT detectives discover crucial hints in the mystery of the teenager’s disappearance
Her name is Tatum Edwards. She was 18 years old when she vanished without a trace in 2021. She didn’t pack her bags or take any family...
350
ghostexodusfreelan2
Nov 20, 20235 min read
Experiment: How easy it was for me to influence Anonymous hacktivists
To say that we are living in a volatile time would be a brazen understatement. Since the onset of #OpRussia and successive operations,...
341
ghostexodusfreelan2
Nov 20, 20237 min read
Hackers explained: an evolution of curiosity and chaos
The first hacking incident occurred in 1878, long before computers were invented. It happened two years after the launch of Alexander...
160
ghostexodusfreelan2
Oct 19, 20236 min read
Anonymity should be your lifestyle choice
“OPSEC is religion,” is a saying I repeat often. It suggests that guarding privacy and anonymity online should be considered a...
500
ghostexodusfreelan2
Aug 21, 20235 min read
#OpChildSafety: cyber vigilantes and the fight for innocence
The fight to protect innocence is an insurmountable power struggle between cyber vigilantes and online predators against children. While...
450
ghostexodusfreelan2
Jul 21, 20236 min read
The passing of Kevin Mitnick: behind the eyes of a hacker
by Mitnick Security Consulting the untimely death of hacker legend and social engineer mastermind Kevin David Mitnick. Mitnick’s...
410
ghostexodusfreelan2
Feb 2, 20235 min read
A Splinter in the Network: Weaponizing Mini PCs
You typically trust the people you work with. After all, you interact with them daily and develop camaraderie. Some you feel comfortable...
1060
ghostexodusfreelan2
Feb 2, 20235 min read
Web Browsers: An Overlooked Vulnerable Nerve Center
You walk into a coffee shop, order something from the menu, and sit down with your laptop. You connect to the public Wi-Fi and begin...
600
ghostexodusfreelan2
Jan 21, 20235 min read
Pwning the Box Over Remote Desktop Protocol
Many years ago, a group of hackers sat at their computers late at night. It was their routine every night. They listened to music, ate...
550
ghostexodusfreelan2
Jan 20, 20234 min read
DNS Spoofing Attacks And How To Protect Yourself
Sep 22, 2021 Just like any other day you come into work and take your place at the cube farm and power up your workstation PC. You enter...
360
ghostexodusfreelan2
Jan 20, 20235 min read
A Closer Look At Hacktivists Thwarting Terrorist Attacks
Hollywood and headlines are largely responsible for what we know about hackers. Also, factor in the unfortunate experiences of system...
2041
ghostexodusfreelan2
Jan 13, 20236 min read
Insider Threats: When Trust Is Broken
Aug 26, 2021 You see him every evening right as you’re about to clock out and get ready for the drive home after a full day’s work. He...
470
ghostexodusfreelan2
Jan 13, 20235 min read
A Hacktivist's Encounter With a Cunning Scammer
Dec 9, 202 I have always prided myself as being impervious to scams. After all, scams used to be part of my hacker toolkit. Hackers can...
471
ghostexodusfreelan2
Jan 10, 20234 min read
RTF Injection Techniques Rise With APT Phishing Attacks
Back in the spring of 2007, I got my hands dirty with phishing attacks. Every year since its inception in the mid-1990s, phishing has...
320
ghostexodusfreelan2
Jan 10, 20234 min read
To Catch an Online Predator
She sits at her computer, sipping from a crystal glass of wine while listening to music. The mixture drives her warfare like the...
890
ghostexodusfreelan2
Jan 4, 20234 min read
Taking a Deeper Look Into New UEFI Invisible Rootkit
The thing about malware is that anti-malware signatures assign a unique hash that is used to identify it. If it can be detected before...
290
bottom of page