Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

PharmaLeaks 3: Customer Acquisition and Affiliate Statistics

Damon McCoy highlights the customer influx trends and basic characteristics of the affiliates operating within the three major online pharmaceutical programs. Now that we’ve looked at product demand and demographics, let’s take a look at how these programs attract new customers (see graph). On the Y...

PharmaLeaks 2: Demographics and Revenue Structure for GlavMed, SpamIt and Rx-promotion

In this entry, Damon McCoy provides results of the study about customer base, products and revenue structure of major online pharmaceutical affiliate programs. In previous studies, a lot of people, including our group, have inferred just small little parts of these online businesses. And it’s always been...

PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs

Damon McCoy, Assistant Professor at George Mason University’s Computer Science Department, gives a great presentation at USENIX Security Symposium dissecting the business model of spam-driven online pharmaceutical industry. I am going to be presenting our work on PharmaLeaks, or as I like to call it:...

Questions with Kevin Mitnick 5: Present-Day Hackers and Controversial Legislation

Final part of this interview is a Q&A section, where Kevin Mitnick answers viewer questions about his attitude to today’s hackers and other relevant matters. Shannon Morse: Well, Kevin, right now we are going to have some awesome viewer questions for you. Alright, so the first one comes from...

Questions with Kevin Mitnick 4: The Grey Hat Houdini of Hackers

Kevin Mitnick expresses his ideas on the state of security nowadays, discussing some real-world engagements he undertook and new projects coming up. Shannon Morse: Given that this book is kind of a look at your past days and hacking, is there anything you regret from the past days? Kevin Mitnick: Yeah, you...

Questions with Kevin Mitnick 3: Escaping Prosecution

In this part, the once most wanted hacker Kevin Mitnick tells Hak5’s Shannon Morse about his experience with the law enforcement when he was a fugitive. Shannon Morse: Speaking of people that you might have social-engineered, and same with the people that might have accused you of things: did you worry...

Questions with Kevin Mitnick 2: Social Engineering and Technical Hacks

This entry reflects autobiographic facts provided by Kevin Mitnick during his interview at Hak5, specifically outlining social engineering tricks he used. Shannon Morse: There were a whole lot of security flaws for a lot of corporates, a lot of companies that you write about in your book. Did you run into...

Questions with Kevin Mitnick

Interviewed by Hak5 tech show’s Shannon Morse, the legendary former hacker Kevin Mitnick unveils exciting facts of his intricate and captivating life story. Shannon Morse: Today I am so excited to have Kevin Mitnick in this studio. Now, Kevin, you are known as the world’s greatest, most wanted hacker....

History of Hacking 4: Real-World Phone Phreaking Stories

As a copestone of his talk, John Draper tells a few stories from his phone phreaking past to show the power you could have playing around with phone numbers. Okay, what I’d like to do now is tell a few stories about some of the stuff that we did, because I kind of wanted to save the best for last. One of...

History of Hacking 3: The Dawn of Computer Hacking

Reasons for phone phreaking effectiveness, as well as peculiarities and flaws of the first known online systems are what John Draper outlines in this part. Why Phone Phreaking Worked Well, AT&T’s decision to use what they called ‘in-band signaling’ was their downfall, very bad idea....