Real time events or network traffic analysis is interesting to track suspicious behaviors. And, if you add some external sources of information, you could increase even more the capability of detecting real events. Such ranking sources applies usually to IP addresses and domain names. They are plenty of online resources
Category: Privacy
Show me your SSID’s, I’ll Tell Who You Are!
The idea of this article came from a colleague of mine. He wrote a first version of the script described below. I found it very useful and asked his permission to re-use it and to write this blog article. Thanks to him! In the mean time, during my researches, I
Honeymail: Track Who’s Leaking Your E-mail Addresses
“E-mail”… What a wonderful online service! When I first connected to the Internet around 1994 (I’m feeling old writing this!), I was so exited to receive my first e-mail! Today, I’m very happy when I received less than 50 e-mails per day! E-mail has been, for years, associated with spam.
Who’s Playing with my Data?
My privacy, your privacy are key requirements in our (online) life! Nobody enjoys seeing personal data used by unauthorized people. Let me tell you a story that happened to me today. I visited the website of a well-known vendor to grab some information about its products. When you’d like to
Your Car Knows a Lot About You!
I got a new company car. W00t! After the basic welcome-tour of the different options, I went deeper and reviewed the on-board computer configuration options. Today, modern cars integrate multimedia interfaces to manage information from several sources: GPS coordinates (past as well as present) Phone books synchronized from phones over
Should Dropbox & Co be Killed?
I’m a big fan of the Dropbox application for a while. Dropbox helps you to synchronize your files within a personal deposit located in the cloud. If you have multiple Dropbox clients configured, your files will be instantly synchronized between all your devices when they come online. I use it
All Your Passwords Are Belong to France?
A few days ago, a buzz hit the information security landscape. /. relayed a BBC article announcing that a new French decree will make hashed passwords illegal. Really? Honestly, when I read this, I also twitted about it. For security professionals, it looks totally unacceptable! Now, the buzz seems over
After Steganography, “Steganodrug”?
Steganography is a technique used to hide a message in another one. This word has a Greek origin: “steganos” means “covered or protected“. A well-known application of steganography is hiding a picture into another one. In information security, it can be useful as an evasion technique. But people have a
Exchanging Files Safely with File Sharing Services
Back in December 2010. During the OWASP Benelux Day, Nick Nikiforakis presented an ongoing study about the privacy of file sharing services. Big players are services like rapidshare.com or megaupload.com. The principle is very simple: you upload your files to a virtual storage space in the cloud and you get
Keep Big Brother away from Your Privacy!
Tomorrow, Friday 28th (or today depending on your timezone) is the Data Privacy Day. Today’s technologies make our day so funny. Could you imagine going back to the eighties and live without Internet, mobile phones, GPS, social networks, credit cards? Funny but so easy to divert and abuse. All services