The Ethics of Publicly Naming Compromised Systems
I spend some time each week researching what Internet miscreants are doing. Because of this, I often encounter compromised systems before their owners know of the breach. As I write this, I currently have outstanding contact attempts for ten organizations with compromised websites - some with which you’re likely familiar.
Continue readingCall me Ishmael
I know you’ve seen my messages. I don’t understand your choice.
Why are you ignoring me?
Continue readingDanger, Will Robinson!
Harry? David? Oh man, I really like those guys… Continue readingAnd... Who Are You?
I really hate the phone calls… they are, unquestionably, the worst.
Continue reading