A common practice of researchers studying a piece of malware is to seize control of its malicious command and control domains, then redirect traffic to them to benign research servers for analysis and victim notification. I always highly recommend monitoring… Read More ›
This week, we discuss red team and blue team self-study, getting kids interested in security, and security paranoia. As always, submit your problems here! Dear Lesley, I am a threat intelligence analyst who is currently underutilized in my current job,… Read More ›
Through a series of eight scenarios, I’ve invited seven security and digital privacy professionals to weigh in on the fundamental question of how much of a privilege digital privacy, and the abilities to “restrict” or “remove” our digital footprint, really are.
I had a absolutely fabulous time chatting with fellow Chicagoan @HashtagLaToya (of shenomads.com) about information security careers, OPSEC, the Chicago security community, and the accuracy of the Mr. Robot TV show. I highly recommend checking out her outreach and education… Read More ›
Thanks for another wonderful week of submissions to my “Ask Lesley” advice form. Today, we’ll discuss digital forensics methodology, security awareness, career paths, and hostile workplaces. Dear Lesley, I’m a recent female college graduate that didn’t study computer science… Read More ›
There’s been a bit of a social media uproar recently about the data collection practices of people search service FamilyTreeNow. However, it’s certainly not the first, only, (or last) service to provide potentially uncomfortable private information about people on the… Read More ›