About Chelsea Allen
This author has yet to write their bio.Meanwhile lets just say that we are proud Chelsea Allen contributed a whooping 69 entries.
Entries by Chelsea Allen
Learn more about how you can help detect rogue devices with Pwn Pulse.
Continuing in our series about Pwn Pulse and its potential uses is the following “fair weather” example. While many associate Pwnie Express tools with penetration testing, it can also be useful for assessing the health of your security processes. The day to day security operations of an average network are not terribly exciting. Once everything […]
Pwnie Express’ very own InfoSec Ranger Jayson E. Street recently appeared on Security Weekly. View the interview on the Security Weekly YouTube page and enter to win a Pwn Phone here! You can learn more about Pwn Pulse (that awesome new Pwnie product Jayson mentioned) here.
RISK ASSESSMENT RATING: 3.33 Popularity: 2 How often the rogue device is used in the wild to conduct real-world attacks, with 1 being the rarest, 10 being widely used. The KeyGrabber can be considered “popular” in the sense that people are talking about it, but real world attacks at this point in its development […]
People love their mobile devices; between gaming, social media, and simply browsing the web, more and more people are turning to a smartphone or tablet for their personal computing needs. For many, work now represents the most time they spend on a traditional desktop or laptop computer. This shift in personal computing is only going […]
We have been talking for quite a while now about the obvious “rogue” devices hiding in your enterprise, but there is another issue highlighted in our post on gifts that has resurfaced again: potentially vulnerable devices within your network that are not obviously rogue. The security and privacy communities have been on absolute fire since news broke about […]
RISK ASSESSMENT RATING: 6.67 Popularity: 7 How often the rogue device is used in the wild to conduct real-world attacks, with 1 being the rarest, 10 being widely used. Another one of the “name brand” penetration testing devices, the #r00tabaga’s popularity stems from its usefulness to conduct multiple types of attacks on a tried […]
Amid a rising tide of security threats both foreign and domestic, the White House recently convened a Summit on Cybersecurity and Consumer Protection aimed at increasing security cooperation between government and private industry. Since the widely publicized attack against Sony Pictures, issues of cybersecurity have become a hot topic for the current Administration, culminating in […]
RISK ASSESSMENT RATING: 8 Popularity: 7 How often the rogue device is used in the wild to conduct real-world attacks, with 1 being the rarest, 10 being widely used. The KeyGrabber is a series of devices, all of which are designed for commercial use in addition to their use for other, maybe more questionable […]