The Evil Twin Attack: Safe use of Public Internet

Author(s):

Patrick Putman, ,

Evil Twin Attack, blue buildings, wifi connected city, smart city

Wireless connectivity has existed now for more than twenty years. And as technology advances, wireless access to the internet increases. Public WiFi access points are everywhere. They exist in restaurants, coffee shops, and shopping malls. Even entire cities offer public access to the internet. Additionally, if you carry a phone, you likely have wireless access … Read more

The Consequences of Digital Piracy

Author(s):

Patrick Putman, ,

Digital Piracy, people pirating music and photos of a giant computer

Digital content can be quite expensive. Especially when you get into the high-end software packages. Sometimes this content costs several thousand dollars. But not everyone can afford these prices. If you have spent any amount of time on the internet, you have heard of digital piracy. Digital piracy is a form of copyright infringement. However, piracy … Read more

What is a Hacktivist?

Author(s):

Patrick Putman, ,

Anonymous Hacktivist Mask

Hacking is no longer just about breaking into a computer to steal money or data. Hackers have developed new methods of influencing policy and bringing about change. Especially with society’s heightened sense of political awareness. Subsequently, they are turning internet activism as a way of spreading their idealism. Simply put, a hacktivist is someone who … Read more

Doxing: The Dark Side of OSINT

Author(s):

Patrick Putman, ,

Computer screen showing Doxing

Exploiting a target is much easier when you know their vulnerabilities. However, learning their vulnerabilities can only come from research. Doxing is a form of Open Source Intelligence. The word originated from an abbreviation of the term “dropping documents.” Doxing is the dark side of OSINT. It is the act of compiling a dossier against … Read more

What is Open Source Intelligence?

Author(s):

Patrick Putman, ,

Camera surveying road, Open Source Intelligence abstract

There are two methods of data collection and information gathering used in military observation. Covert gathering refers to the use of clandestine, or secret data sources. As a result, covert methods are often illegal due to being performed secretively. Overt data collection refers to methods used openly or in plain sight. Overt does not involve … Read more

Pretexting: The Art of Impersonation

Author(s):

Patrick Putman, ,

Pretexting, hacker working on business interface, sinister, animated

What is Pretexting Pretexting is a social engineering tactic that uses deception and false motives. Simply put, pretexting crafts fictional situations to obtain personal, sensitive, or privileged information. Pretexting often involves researching the target prior to the attack. The data collected is then used to manipulate and deceive the victim. The main goal of the … Read more