asteroza + theft   26

TechNet ATA Suspicious Activity Playbook
This article will walk through the credential theft attack techniques by using readily available research tools on the Internet.
windows  security  credential  theft  lateral  movement  detection  guide  reference  information  pentesting 
october 2017 by asteroza
Annual Credit - Home Page
You can get one free web report from the big three credit report agencies here
US  personal  credit  report  service  free  finance  money  tools  security  identity  theft  check  information 
may 2014 by asteroza
Harris Corporation Introduces USB Thumb Drive Designed for U.S. Government Cyber Security Missions
I'm curious as to how this operates. Is this using some kind of device driver hole to extend it's claws into the host OS? Or is this like the BlackDog, a USB parasite computer that used a virtual CD and a virtual ethernet adapter to get onboard the host OS? If it claims no footprint, then it either has to boot the host into a special forensic LiveCD OS (with associated issues), or use some other trick...
Harris  BlackJack  USB  hardware  electronics  devices  automated  PC  file  search  data  information  extraction  surveillance  intelligence  counterintelligence  theft  law  enforcement  security  Delicious 
october 2010 by asteroza
The SoBi lockbox prototype is up and running! A... - SoBi
Interesting cellphone network connected bicycle lock, equipped with GPS, to monitor bicycles used in a bicycle share program. While not impervious to assault/theft, this makes for a potentially far more useful sharing system since you are not functionally required to return bicycles exclusively to prepositioned bicycle storage/recharge/locking facilities. I wonder about the long term power issues of the battery powering the thing though. Maybe a forward wheel power generator dynamo to recharge the cellphone/lock computer?
SoBi  social  bicycle  sharing  GPS  cellphone  mobile  phone  lock  hardware  electronics  devices  antitheft  theft  vandalism  tracking  monitoring  vehicle  transportation  green  Delicious 
september 2010 by asteroza

related tags

access  ActiveSentry  Adeona  alarm  alert  Alertron  alternative  analysis  antitheft  art  asset  auditing  automated  beacon  bicycle  BlackJack  blocking  blog  bluetooth  cellphone  check  compliance  computer  content  ContextIQ  control  copy  copyright  counterintelligence  credential  credit  data  defense  Delicious  design  detection  device  devices  digital  DLP  document  dongle  download  drive  DRM  EDRM  EDS  electronics  endpoint  enforcement  enterprise  EPS  espionage  exploit  extraction  extrusion  factor  file  filter  filtering  finance  flash  fob  form  fraud  free  freeze  GadgetTrak  GPS  graphic  green  guide  hacking  hardware  Harris  homing  howto  ID  identity  information  inspection  intelligence  iPod  keyfob  laptop  lateral  law  leak  leakage  lifehacks  Lifelock  liquidmachines  location  locator  lock  logging  lojack  loss  lost  management  memory  mobile  money  monitoring  movement  online  opensource  p2p  packet  paranoia  PC  pentesting  personal  phone  plagarism  podslurping  portable  position  prevent  prevention  printing  privacy  private  proof-of-concept  protection  proximity  proxy  re  recover  recovery  reference  reminder  remote  report  reporting  rights  scanner  search  security  service  sharing  small  sniffing  SoBi  social  software  solution  suite  surveillance  system  text  theft  tips  tools  tracker  tracking  trademark  traffic  transportation  travel  tutorial  US  USB  use  utilities  vandalism  vehicle  violation  web  webfilter  website  windows 

Copy this bookmark: