877.791.9571 |

About the Author:

Kim Crawley is currently a security author for InfoSec Institute. She has worked in tech support and as an IT technician for a variety of smaller businesses. She has learned about vulnerabilities in network protocols, operating systems, applications and hardware and uses that knowledge in her everyday work in IT. Learning how malware is developed and how cracking works informs her views on keeping networks secure.
Blackhat-Movie-Logo-01232015

Does Blackhat Accurately Depict Cyberwarfare?

Spoiler alert: Those who haven’t yet seen the film, but plan to, please skip to the summary.

Hollywood has tried to depict cyberwarfare and “hacking” many times. Hackers and The […]

SilkRoad01192015

A Controversial Tale of Covert Markets: The Ongoing Silk Road Saga

Everyone knows that drug prohibition has done nothing to stop the sale and consumption of illegal drugs.

The risk of getting into criminal trouble exists, especially if you don’t benefit […]

Lizard-Squad-01072015

Lizard Squad’s Attack on Sony PS: Lessons Learned

Alright, now it’s personal. I got a few new games for my PS Vita and my PS4 for Christmas. Thankfully, they each have a single-player mode, because there’s no […]

DRM4-12302014

The Fascinating Story of DRM: Can You Go Without It?

In my last article, I explained some of the problems millions of users have had with the most popular productivity applications.

Microsoft and Adobe are trying to get users to […]

DRM3-12222014

The Fascinating Story of DRM, Part Three: Big Corporate Lost Productivity

It’s a real bummer when people spend a lot of their money on AAA PC games only to not be able to play them. Major publishers like EA, Activision, […]

SimCity2013-12152014

The Fascinating Story of DRM: Part Two, The Origin of Launch Week Battle

In my last piece, I explained how Nintendo’s experiences with piracy and copy protection helped shape the current video game industry, where Sony has been a major player for […]

sandiego12112014

The Fascinating Story of DRM, Part One: Wario’s Woes

When I was a little girl, I loved playing Where in the World is Carmen Sandiego? and Where in Time is Carmen Sandiego? When my father bought me the […]

Kerberos11202014

The Windows Kerberos Vulnerability: What You Need to Know

A mythological three-headed dog was supposed to guard the gates of Redmond. But it turns out that Kerberos was very poorly implemented in numerous versions of Microsoft Windows.

On November […]

NSA111714

Can the Senate Reform the NSA?

We’re coming to the end of a period of Saturn and Pluto being in mutual reception. It started on October 16th 2012, and it’ll end on December 24th of […]

usps-11132014

The USPS Attack: Did It Come From China?

You can’t say I didn’t warn you. In August, I wrote about the growing Chinese cyberwarfare threat. In my research for that article, I spent many hours reading publically […]

Metadata11122014

Digital Trails: Metadata and Privacy

There was someone in my extended family who ran an investor relations firm. For his sake, I won’t name him. One day, he sent my late father death threats […]

1U_icon_11072014

1U Password Manager Review

Take a moment and think about how many different passwords you use. Most of us have Google, Facebook, and Twitter accounts. Hopefully, your user accounts on both your home […]

hacker-proof10232014

Why You Must Hacker-Proof Your Employees: Creating a Secure Corporate Culture

If you’re a CTO or a network admin, you’ve probably memorized some of the basics of network security. Have lots of well-configured firewalls and IDS/IPS devices. Use switches instead […]

Lock10202014

How Can Android Smart Lock Be Attacked?

When official details of the new features in Android 5.0 Lollipop were released last week, Android Smart Lock piqued my interest. It’s a lock screen controlling feature that uses […]

Android_Lollipop-10172014

Is Lollipop The Most Secure Android Ever?

Android fans such as myself have been eagerly anticipating the upcoming new stable version of Android, 5.0 Lollipop.

Android 5.0 was introduced with the codename “Android L” at the Google […]

medical-password10092014

Can Security Vulnerabilities Kill?

Your health is your life
Keeps you alive
Hillside Avenue by Simply Red
Written by Mick Hucknall
Courtesy of EMI Music Publishing Ltd/So What Ltd
In the past few years, I’ve written about security […]

photoshopped10012014

A Digital Forensics Approach to the Celebrity Nude Photo Scandal

On August 31, 2014, news broke that nude photos of Jennifer Lawrence, Ariana Grande, Kate Upton, and other young female celebrities were being shared on 4chan. Jennifer Lawrence’s representative […]

smart-home-icon09242014

Are Smart Homes a Dumb Idea?

Now that we’re well into the second decade of the 21st century, mobile computing technology and the increasingly ubiquitous nature of the Internet have been making strides into even […]

chinese-bd-09232014

Yes Virginia, There Are Chinese Backdoors In Our Telecommunications Infrastructure

But there’s no Santa Claus. I do indeed have a sanity clause, though.

Intelligence agencies and private security researchers in the United States, the United Kingdom, and other countries have […]

apple-pay09172014

Is Apple Pay Safe?

On September 9th, during Apple’s iPhone press event, the corporation announced a few new products, of which you’re probably already aware of. Two new iPhones to catch up with […]