hacking

125 Articles 0 Followers


QT Wallets - Could Someone Hack My Wallet.dat File?

13 Sep 2019 2 minute read 7 comments drlove

I was looking forward to the trip as I had just recovered from a fracture that kept me bed-ridden for two months. After ten hours of driving  I made my first stop at a border town to Laos, my intended destination. The next morning I was ready to boot...

Discussing Cybersecurity with Lou Covey from Crucial Tech Podcast

20 Aug 2019 1 minute read 0 comments Matthew Rosenquist

I truly enjoy open-ended cybersecurity interviews because it is such a dynamic field that impacts everyone in different ways.  You never know where the conversation will flow.  I just chatted again with Lou Covey who hosts the Crucial Tech podcast (...

Reviewing the 11 Hot (and not) Cybersecurity Trends

17 Aug 2019 4 minute read 0 comments Matthew Rosenquist

Recently an article came out describing several cybersecurity trends which are hot and a few that are going cold.  I read through the list and made a quick comment in LinkedIn that I was not entirely in agreement with the assessment.  I figured that...

(IJCH) After one week, I unbricked & restored my girlfriend's smartphone! (or How I learned how to hack into Android phones)

17 Jul 2019 3 minute read 2 comments JaiChai

(IJCH) After one week, I unbricked & restored my girlfriend's smartphone! (or How I learned how to hack into Android phones)   Source   IJCH - Inside JaiChai's Head (Meaning: My Warped, Personal Opinions and Musings)   Source   From the Author: Salut...

Another victim of hackers, cryptocurrency exchange Bitrue

28 Jun 2019 1 minute read 0 comments fulghum

The security of cryptocurrency exchanges is still weak. Not even a month will pass, so at least one will not lose money after a hacker attack. The last case is the Singapore cryptocurrency exchange Bitrue, which has announced that hackers have stole...

Trustworthy Response to Product Vulnerabilities Demonstrates Leadership

21 May 2019 1 minute read 1 comment Matthew Rosenquist

I applaud Google for taking extraordinary steps to protect and service their customers by offering free replacements for the Titan Bluetooth Security Keys. Such product recalls can be expensive, time consuming, and prolong negative stories in the ne...

How Nation States are Reshaping the Cybersecurity Landscape - Tomorrow on the Security for All Podcast

2 Apr 2021 1 minute read 2 comments Matthew Rosenquist

Time to talk about how nation-state cyber attacks are impacting everyone's digital security! Cybersecurity will never be the same! Come join the live discussion tomorrow, April 2nd at noon Pacific! https://voiceamerica.com/show/4002

Another Creepy Case of Hackers Watching People in their Homes

1 Feb 2021 1 minute read 0 comments Matthew Rosenquist

Protect yourself from creepy hackers that watch people on their home cameras. When it comes to cameras installed inside of homes, there is always a risk of someone else gaining access and watching over you! There are things you can do to protect you...

FireEye Hacked – A Stark Reminder of Cybersecurity Risks

10 Dec 2020 1 minute read 0 comments Matthew Rosenquist

Even the best security organizations can be hacked!  Watch my message to both the cybersecurity industry as well as those attackers that hacked FireEye and stole the RedTeam tools.  This skirmish went to the hackers, but the battle continues.

Future of Offensive Attack Simulation: Strategies, Tools & Techniques

18 Nov 2020 1 minute read 0 comments Matthew Rosenquist

A hack is executed every 39 seconds and impacts one in three Americans every year. Join us in the discussion on Future of Offensive Attack Simulation: Strategies, Tools & Techniques with Bikash Barai and Matthew Rosenquist   Click Here to Join the C...