spylogic.net
spylogic.net is a personal blog authored by Tom Eston, a cyber-security professional, security and privacy researcher, blogger and co-host of the Shared Security Podcast.
The Legacy of The Hacker Manifesto
Tom | | Andra Zaharia, Apple, Apple ][e, Apple 2e, Apple II, BBS, Cyber Empathy, Cybersecurity, ethical hacking, Ethics, hacker, Hacker Manifesto, Hacking, Information Security, Manifesto, Modem, Old School, Podcast, The Hacker Manifesto, Vintage, Vintage Computing, Warez
I was 11 years young when The Hacker Manifesto was originally published in 1986 (yes, I’m that old). I had no idea about the manifesto at that age but several years later ...
Introducing the Shared Security Weekly Blaze Podcast
As many of you may know, I’ve been co-hosting the Shared Security Podcast (formally known as the Social Media Security Podcast) with my fabulous co-host Scott Wright from Security Perspectives Inc. We’ve been ...
Using Technology to Defend Digital Privacy & Human Rights – Presentation Notes
Tom | | Presentation Notes, Privacy, Privacy on the Internetz, security, signal, tails, tor, VPN, whonix
If you attended my talk “Using Technology to Defend Digital Privacy & Human Rights”, thank you! Here’s a list of supplemental material discussed during the presentation as well as where you can ...
Top 5 Attack Vectors Report: Defend It Before You Hack It
Each year my team conducts hundreds of Penetration Tests in a wide variety of industries, ranging from Healthcare to Retail, Finance to Manufacturing, and many more. The team analyzed data collected from each of ...
Project Mayhem to be Unleashed at Black Hat Abu Dhabi
For the last several months I’ve been performing research on techniques attackers could use for performing accounting fraud in popular accounting systems. This research coincides with a whitepaper that SecureState has developed entitled “Cash ...
Burp Suite Series: Efficient use of Payload Options when Attacking HTTP Basic Authentication
In this series of blog posts I’ll be discussing some handy Burp Suite techniques we often use on our penetration tests. Burp Suite is our de facto tool of choice for assessing ...
SANS Mentor brings Security 542: Web App Penetration Testing and Ethical Hacking (GWAPT) to Cleveland
I’m proud to be teaching SANS Security 542 here in Cleveland through the SANS Mentor Program beginning in August. The SANS Mentor Program allows you to save thousands on your training budget ...
Are We Reaching Security Conference Overload?
I saw a post from my friend Matt Neely on Twitter about how CarolinaCon and BSidesROC are on the same weekend this year. I’ve also had conversations with others earlier this week ...
Three Areas You Need To Test When Assessing Mobile Applications
Having spoken at both at the SANS Mobile Device Security Summit as well as OWASP AppSec DC recently about testing mobile applications I’ve encountered that like the old saying goes “There are ...
Smart Bombs: Mobile Vulnerability and Exploitation Presentation
Tom | | android, Apple, Computer Forensics, mallory, Mobile, mobile applications, Mobile Security, owasp, Penetration Testing, pentesting
This week I co-presented “Smart Bombs: Mobile Vulnerability and Exploitation” with John Sawyer and Kevin Johnson at OWASP AppSec DC. We talked about the some of the current problems facing mobile applications ...