Welcome!

By registering with us, you'll be able to discuss, share and private message with other members of our community.

SignUp Now!

Search results

  1. E

    Mousejacking

    I've been looking into this vulnerability recently (it was publicly released circa 1yr ago). Has anyone (forensic examiners???) investigated any incidents/seen it used in the wild? Would be interested to know. Basically, it exploits a certain chipset used in wireless mice/keyboards and the...
  2. E

    Bringing 'cyber' skills into surveillance

    Hi all, Question for the surveillances specialists out there; does anyone use wi-fi to identify locations a subject has been linked to? Could be useful in a loss situation during mobile surveillance. When someone leaves their wi-fi on, their device (likely to be a phone in this case) will...
  3. E

    Expl01t Intro

    Q. What area of the Security Industry are you interested in? A. Cyber Security, Consulting, Open Source Intelligence, Internet Investigation, Social Engineering. Q. Do you represent a company, if so what's the company name and your role? A. N/A Q. What do you hope to gain from the Close...
Top Bottom