"Hacking" iCloud for Deleted Celebrity Nudes [securitytheater.phoneboy.com]
A lot of noise has been made recently about some nude celebrity photos that have made their way around the Internet, such as those of Jennifer Lawrence. Lo and behold: there they were. Voila!
What is Palo Alto Networks Afraid Of? [securitytheater.phoneboy.com]
While I don't typically read End User License Agreements, I was pointed to the following phrase that exists in the End User License Agreement for Palo Alto Networks equipment:
The Department of Yes [securitytheater.phoneboy.com]
I was listening to Episode 395 of the Security Weekly podcast when I heard one of the guys say that Information Security is often The Department of No. As in, no, you can't use that device. Why?
How To Start Google Chrome In Incognito Mode On Windows [securitytheater.phoneboy.com]
I know a few articles have been written about this topic already elsewhere. That said, I sometimes will do a blog post so if I need to find something again, I know it will exist on my own blog.
PhoneBoy Speaks, The Information Security Edition [securitytheater.phoneboy.com]
While it’s not always a focus area of my PhoneBoy Speaks podcast, I do occasionally cover Information Security topics on my podcast. Welch-Abernathy at PhoneBoy's Security Theater on April 26, 2015.
Breaches Are Inevitable, Or Are They? [securitytheater.phoneboy.com]
From Palo Alto CEO: Beware the Internet of Things – and watch your car: That’s sort of the equivalent.” We can argue whether or not breaches are inevitable all day long.
Lies, Damn Lies, and Inspecting SSH Traffic Securely [securitytheater.phoneboy.com]
SSH is a wonderful tool for accessing remote systems via a CLI. If you’re so inclined, you can even use an SSH tunnel as a SOCKS proxy. And therein lies the problem. Why is that an issue? Disclaimer:
The Right Way To Inspect SSH Connections [securitytheater.phoneboy.com]
When talking with Check Point customers, a common request I hear is for the ability to “decrypt” SSH traffic, see inside of said traffic, and make security decisions based on what it finds, including…
All The Security Tools In The World Won't Help If You Don't Do This [securitytheater.phoneboy.com]
In my travels as a Security Architect for Check Point Software Technologies, I have seen many different customer environments. And I’ve got a good sense for why. What is this thing? Discl…
Well then, it appears fixing my RSS feed kicked PourOver into action. Apologies for the vomit.