What are weak IVs? Can we somehow stop or slow down WEP cracking by avoiding usage of them?

Most of us dealing with wireless security must have cracked a WEP key, and while doing that must have come across texts like this:

weak IVs, reveal more information about the secret part of the WEP key than others–about … Continue reading What are weak IVs? Can we somehow stop or slow down WEP cracking by avoiding usage of them?

IoT Devices as Proxies for Cybercrime

Multiple stories published here over the past few weeks have examined the disruptive power of hacked “Internet of Things” (IoT) devices such as routers, IP cameras and digital video recorders. This post looks at how crooks are using hacked IoT devices as proxies to hide their true location online as they engage in a variety of other types of cybercriminal activity — from frequenting underground forums to credit card and tax refund fraud. Continue reading IoT Devices as Proxies for Cybercrime

Forming Voltron’s Blazing Sword For Real

Activate interlock! Dynotherms connected! Infracells up! Mega thrusters are go! If you grew up in the 80’s you undoubtedly know that quote means it’s time to form Voltron. The 1984 Lion Force Voltron series has shown an incredible amount of staying power. These 5 lions have come together to form no less than 3 reboot series, the most recent coming out just this month from Dreamworks and Netflix.

[Matt and Kerry Stagmer], blacksmiths for the Man at Arms web series haven’t forgotten Voltron either. Every episode of the original series ended with the mighty robot defeating enemies using an iconic …read more

Continue reading Forming Voltron’s Blazing Sword For Real