if someone has my mac address can they hack my email without me knowing about it?

I have a guest house with a wireless network. My guests are given a password to our “Guest Network”. Is it possible for someone on this “Guest Network” to see my mac address, spoof it and then use my mac address to sign in to my email acco… Continue reading if someone has my mac address can they hack my email without me knowing about it?

Posted in Uncategorized | Tagged

Detecting Spoofed Messages Using Clock Skew

Two researchers are working on a system to detect spoofed messages sent to automobiles by fingerprinting the clock skew of the various computer components within the car, and then detecting when those skews are off. It’s a clever system, with applications outside of automobiles (and isn’t new). To perform that fingerprinting, they use a weird characteristic of all computers: tiny… Continue reading Detecting Spoofed Messages Using Clock Skew

List of visually similar characters, for detecting spoofing and social engineering attacks

I’m trying to detect homograph attacks and other attacks where an attacker uses a spoof domain name that looks visually similar to a trusted domain name (e.g., bankofthevvest.com instead of bankofthewest.com).

Is there a dic… Continue reading List of visually similar characters, for detecting spoofing and social engineering attacks

Why is Norton Safe Web flagging my site as dangerous when it reports on PHP files/urls that don’t exist?

I’m in a bit of a quandary over Norton Safe Web’s rating of my company’s website.

My question is: is it possible for someone to fool Norton Safe Web into thinking that our website has PHP files which don’t exist? Could there be some sort … Continue reading Why is Norton Safe Web flagging my site as dangerous when it reports on PHP files/urls that don’t exist?