Entries by Chelsea Allen

Remote Site Security with Pwn Pulse

Continuing in our series about Pwn Pulse and its potential uses is the following “fair weather” example. While many associate Pwnie Express tools with penetration testing, it can also be useful for assessing the health of your security processes. The day to day security operations of an average network are not terribly exciting. Once everything […]

InfoSec Ranger Jayson E. Street on Security Weekly

Pwnie Express’ very own InfoSec Ranger Jayson E. Street recently appeared on Security Weekly. View the interview on the Security Weekly YouTube page and enter to win a Pwn Phone here! You can learn more about Pwn Pulse (that awesome new Pwnie product Jayson mentioned) here.

Rogue Device Spotlight: KeySweeper

RISK ASSESSMENT RATING: 3.33   Popularity: 2 How often the rogue device is used in the wild to conduct real-world attacks, with 1 being the rarest, 10 being widely used. The KeyGrabber can be considered “popular” in the sense that people are talking about it, but real world attacks at this point in its development […]

Google Tackles BYOD with Android for Work

People love their mobile devices; between gaming, social media, and simply browsing the web, more and more people are turning to a smartphone or tablet for their personal computing needs. For many, work now represents the most time they spend on a traditional desktop or laptop computer. This shift in personal computing is only going […]

Lenovo Puts Ad Revenue over Security with Superfish

We have been talking for quite a while now about the obvious “rogue” devices hiding in your enterprise, but there is another issue highlighted in our post on gifts that has resurfaced again: potentially vulnerable devices within your network that are not obviously rogue. The security and privacy communities have been on absolute fire since news broke about […]

Rogue Device Spotlight: #r00tabaga MultiPwner

RISK ASSESSMENT RATING: 6.67   Popularity: 7 How often the rogue device is used in the wild to conduct real-world attacks, with 1 being the rarest, 10 being widely used. Another one of the “name brand” penetration testing devices, the #r00tabaga’s popularity stems from its usefulness to conduct multiple types of attacks on a tried […]

White House Security Summit Urges Cooperation

Amid a rising tide of security threats both foreign and domestic, the White House recently convened a Summit on Cybersecurity and Consumer Protection aimed at increasing security cooperation between government and private industry. Since the widely publicized attack against Sony Pictures, issues of cybersecurity have become a hot topic for the current Administration, culminating in […]

Rogue Device Spotlight: Wireless KeyGrabber

RISK ASSESSMENT RATING: 8   Popularity: 7 How often the rogue device is used in the wild to conduct real-world attacks, with 1 being the rarest, 10 being widely used. The KeyGrabber is a series of devices, all of which are designed for commercial use in addition to their use for other, maybe more questionable […]