Welcome!

By registering with us, you'll be able to discuss, share and private message with other members of our community.

SignUp Now!

Search results

  1. E

    Mousejacking

    I've been looking into this vulnerability recently (it was publicly released circa 1yr ago). Has anyone (forensic examiners???) investigated any incidents/seen it used in the wild? Would be interested to know. Basically, it exploits a certain chipset used in wireless mice/keyboards and the...
  2. E

    I know how this sounds but it's the truth. My computer screen is monitored 24/7 How?

    Glad to see this thread is going so well.
  3. E

    Bringing 'cyber' skills into surveillance

    Hi all, Question for the surveillances specialists out there; does anyone use wi-fi to identify locations a subject has been linked to? Could be useful in a loss situation during mobile surveillance. When someone leaves their wi-fi on, their device (likely to be a phone in this case) will...
  4. E

    I know how this sounds but it's the truth. My computer screen is monitored 24/7 How?

    Thank you! I've no doubt that me and SCT will have many a chat in the future. It might liven up the cybercrime forum a bit and encourage more to join in. That said, if anyone has any 'cyber' related questions I can do my best to help.
  5. E

    I know how this sounds but it's the truth. My computer screen is monitored 24/7 How?

    WanaCry was referenced as recent incident that most will recognise, and only referenced as it exploits network protocols and that file system is irrelevant. The specific host OS that it exploits natually (or most commonly) in the wild was not the point being made here.
  6. E

    I know how this sounds but it's the truth. My computer screen is monitored 24/7 How?

    I hadn’t realised that anyone was arguing. However, you’ve just suggested that users won’t get compromised by governments if they use Linux, and then followed that comment with ‘you can NEVER stop a cyber attack’. Do you not think that these comments are somewhat contradictory? I concur with...
  7. E

    I know how this sounds but it's the truth. My computer screen is monitored 24/7 How?

    I am indeed also a fan and regular Linux user. And whilst I understand your sentiment around using Linux, its use alone is not sufficient to stop cyber-attacks. Linux in all its guises over the years has also been vulnerable to a substantial number of exploits. Good security practices are key...
  8. E

    I know how this sounds but it's the truth. My computer screen is monitored 24/7 How?

    I’m going to take a shot at replying to this on a semi-sensible level, purely because it may interest others. I hope, however, that you appreciate how your post has provoked sarcastic responses. While software on your computer could be exploited through vulnerabilities, if your software...
  9. E

    Expl01t Intro

    Q. What area of the Security Industry are you interested in? A. Cyber Security, Consulting, Open Source Intelligence, Internet Investigation, Social Engineering. Q. Do you represent a company, if so what's the company name and your role? A. N/A Q. What do you hope to gain from the Close...
Top Bottom