David Eason

1,818 Flips | 15 Magazines | 18 Likes | 1 Following | 8 Followers | @DavidEason | Cybersecurity professional and engaged citizen. DavidEason.com

Meet The “Kratom Warriors” Who Say This Plant Will End The Opioid Epidemic

Is kratom the answer to the opioid crisis — or the start of a new one?<p><b>By the time Courtney True</b> found the Reddit thread about kratom in December 2016, she hadn’t touched an opioid for 48 hours. She was in bad shape — stomach cramps, diarrhea, jitters, hot sweats, cold sweats, and body aches that …


‘Warning Lights Are Blinking Red,’ Top Intelligence Officer Says of Russian Attacks

WASHINGTON — The nation’s top intelligence officer said on Friday that the persistent danger of Russian cyberattacks today was akin to the warnings the United States had of stepped-up terror threats ahead of the Sept. 11, 2001, attacks.<p>That note of alarm sounded by Dan Coats, the director of …


North Korea's Lazarus Group sets sights on cryptocurrency

Researchers believe North Korean nation-state hackers from the Lazarus Group are targeting cryptocurrency exchanges and owners in a wave of …


Cyber criminals 'infect and collect' in cryptojacking surge

For just $10, a hacker can attack your business via RDP: Here's how to stay safe

RDP access is being used as an entryway for hackers. Be careful yours doesn't end up for sale on the Dark Web.<p>Remote desktop protocol (RDP) access to …


Malicious Software Packages Found On Arch Linux User Repository

Yet another incident which showcases that you should not explicitly trust user-controlled software repositories. One of the most popular Linux …


GandCrab Ransomware Continues to Evolve But Can't Spread Via SMB Shares Yet

Recent fears that this year's most prolific ransomware threat has acquired new WannaCry-like propagation capabilities appear unfounded at the moment.


Millions of Verizon customer records exposed in security lapse

Customer records for at least 14 million subscribers, including phone numbers and account PINs, were exposed.<p><i>Security TV: Can cyber insurance bring</i> …


New Spectre-like attack uses speculative execution to overflow buffers

Research is continuing to find new attack vectors.<p>When the Spectre and Meltdown attacks were disclosed earlier this year, the expectation was that …


VPNFilter-affected Devices Still Riddled with 19 Vulnerabilities

<i>by Tony Yang and Peter Lee (Consumer Yamato Team)</i> <br>Our IoT Smart Checker allows users to identify if connected devices (e.g. routers, network attached …

Information Security

Cyber attackers cashing in on ‘hidden’ attack surface


Year-Old Critical Vulnerabilities Patched in ISP Broadband Gear

Broadband gear made by Advanced Digital Broadcast is being patched to fix three vulnerabilities rated critical.

Information Security

Florida Man Jailed for Failing to Unlock His Phone

What started as a routine traffic stop has quickly escalated into a civil rights case in a Florida courtroom after a man was put behind bars this …


Hackers are using botnets to take the hard work out of breaking into networks

Just 15 seconds is all you need to break into a network and lay the way for an attacker -- if you have a botnet.<p>Why hack a network when you can get a …

How Analysts Approach Investigations

A challenge facing information security is our inability to effectively train new analysts. The majority of security knowledge is tacit. We have …


Chris Sanders

Whittling is a lost art, but it’s a beautiful process. A craftsman chooses a lifeless…<p>There’s nothing more frustrating than knowing the answers you …

Information Security

An Arkansas man complained about police abuse. Then town officials ruined his life.

When body-camera footage of an aggressive or abusive police officer goes viral, the response from law enforcement groups is often to caution that we shouldn’t judge the entire system based on actions of a few bad apples. That’s fair enough. But what does it say about the system when the cops gets …


Video: Building an NSM Lab

Building a security lab is something I get asked about really often. So often, in fact, that I decided to put some of my notes together and record a …


Secure Kali Pi 2018

We have covered how to create secure “throw-away hack boxes” using the Raspberry Pi before, but we thought it was time to go back and take a look at …


SIM card in bird’s GPS tracker used to rack up $2,700 phone bill

Researchers assumed the bird was dead when its GPS signal stopped moving. A few weeks later the team received a giant phone bill.


Endangered animals at growing risk from GPS ‘cyber-poachers’

Tagging endangered animals with radio trackers to study their behaviour is being abused to aid “cyber-poaching” and other human interference, an …


Vodafone emits new wearable ... kid-trackers

Creepy? Nah. Selling peace of mind to hyper anxious parentsThe best thing in two new consumer wearables Vodafone launched today is not mentioned by …

Internet of Things

BGP borked? Blame the net's big boppers

Researcher says routes are leaking because ISP giants aren't filtering route infoThe Internet's fundamental routing infrastructure, the Border …

Information Security

PayPal, Google ordered to make suspected pirates walk the plank into freezing waters

Follow the money: Florida judge signs off on new IP attackPayPal and Google have been hit with court injunctions telling them to freeze accounts …


Security Center

Intel Corporation

Russian company had access to Facebook user data through apps

A Russian internet company with links to the Kremlin was among the firms to which Facebook gave an extension which allowed them to collect data on unknowing users of the social network after a policy change supposedly stopped such collection.<p>Facebook told CNN on Tuesday that apps developed by the …

Social Media

Google Translate

200,000 Cisco Network Switches Reportedly Hacked

<b>What Remediation Steps Should Be Taken?</b><br>Over 200,000 Cisco networks switches worldwide reportedly were hacked Friday, apparently affecting critical …

Information Security

Trustwave Sued by Insurers Following Heartland Breach

Trustwave Sued by Insurers Following Heartland BreachA security vendor is being sued to the tune of $30m by two insurance companies looking to recoup …

Ticketmaster Breach Part of Massive Payment Card Hacking Campaign

Threat actor Magecart has infiltrated over 800 e-commerce sites with card skimming software installed on third-party software components, RiskIQ says.