The Darknet Hell Forum Timeline Revisited

Darknet Hell forum web

Back in April of this year I wrote about the AdultFriendFinder data breach: Hacked! How safe is your data on Adult Sites? I did not mention the name of the hacked site because I was worried that I could potentially face legal repercussions. So, I sat on a leaked database of almost 3.9 million unique email addresses that exposed age, gender, race, sexual preferences, and more   until the British TV station, Channel 4 revealed the breach in May.

After the media attention settled down, my Da...

Read More

Secure remote employee’s SOHO routers & eliminate backdoors into your network

remote employee SOHO router security

With increasing commute times and technological advances, remote employees who work from home have become a reality. Even if a company has provided the employee with hardware, security software, a VPN connection, encryption, and security training — securing the Small Office/Home Office (SOHO) router is often overlooked and underestimated.

Because I was an IT security consultant for two decades and currently work remotely as an employee for a threat intelligence corporation — I tend to look at...

Read More

Cyberextortion ups the ante

cyberextortion DDoS

With everything that has been occurring upon the treacherous terrain of the cyberthreat landscape this year – we have not arrived at the point of a digital Pearl Harbor yet.

TechTarget defines cyberextortion as “a crime involving an attack or threat of attack against an enterprise, coupled with a demand for money to avert or stop the attack.”

Though cyberextortion can arrive in various forms – a cybercriminal’s end goal is to make a huge profit, using whatever means is necessary to bully ...

Read More

Healthcare sector is finding ways to minimize hackability


Did you know that the healthcare industry is a far easier target for hackers to invade than banking or retail is? With more entry points into healthcare systems  cybercriminals can attack medical devices such as CT and PET scanners, MRI machines, and PACS via MEDJACK (medical device hijack) and infect them with malware  thus creating backdoors into your hospital network.

Hackers in the Darknet are already discussing the possibilities...

Read More

That Ashley Madison “Thing”

Ashley Madison thing

I made it though the AdultFriendFinder’s (AFF) craze, barely…

I am not the type of person that likes a lot of media attention. I tend to find my comfort zone in the area of research and writing. Though I can do any company or brand justice in the realm of social media  by nature, I am actually a very quiet and introspective person in regards to my private life. You won’t find me tweeting about a trip to the coast or mountains, until after the fact.

Even when I arrived at the point of doxxi...

Read More

Healthcare hackers & their dirty little secrets

hackers and medical data

In the world of cybersecurity, the healthcare industry is under siege. A Google search for ” healthcare breach ” now yields about 28,000,000 results , where a Google news search returns 100,000 news articles. Stolen healthcare insurance credentials are like a significant other to a hacker and may reveal things we would prefer to keep private and hidden. In 2015, healthcare data breach victims appear to be adrift with little or no protection or navigation.

“The risk for ongoing data exfiltr...

Read More

Travel: Using Wi-Fi in-flight?

Wi-Fi information security when traveling

When you are 30,000 feet in the air and your flight offers Wi-Fi, are you really thinking about hacker Jon who is sitting in seat 44C? Probably not. Most people do not even consider that in-flight Wi-Fi is just like public Wi-Fi at a coffee shop. When you purchase time on an in-flight wireless network, your credit card transaction is encrypted. Once the transaction is complete, your laptop and devices are flying high in their birthday suits, again, if you do not take information security hygie...

Read More

Darknet cybercriminal reflections: They’re so clever!

darknet criminal

I’ve spent a copiousness amount of time on the Darknet this year in a quest to gain more understanding on how cybercriminals think. I’ve been studying their communities, how they operate in the Darknetmarkets, perusing their forums, analyzing their marketing techniques, and contemplating how they justify their criminal activities.It’s been fascinating, and at the same time disconcerting.


It has been fascinating because I have learned so much about OPSEC (operational security), and my lear...

Read More

A breach is found. Now whom do I tell?

data breach

In 2014, the ITRC (Identity Theft Resource Center) tracked 783 data security breaches with 85,611,528 confirmed records exposed. This year appears even more dismal. The ITRC Data Breach Reports 3 for July 7, 2015 captured 411 data incidents with 117,678,050 confirmed records at risk. Since data breaches are a common occurrence in today’s information security threat landscape,  it’s going to become de rigueur for companies to pump up security preparedness within their incident response plan...

Read More