Skip to content

Packet Ogre

Mangling the Security Swamp

Primary Menu
  • Email Stipulations
  • Disclosure
  • PGP Key
  • Github
  • Twitter

Swamp_Keeper

Behind Blue Eyes

Posted on July 13, 2016July 7, 2017 by Swamp_Keeper

The Who once sang in their great song Behind Blue Eyes, “No one knows what it’s like, To be the bad man, To be the sad man, Behind blue eyes…” I like that song always have. But every once in a while our in-justice system shows how ignorant and foolish Continue Reading

Posted In Information Security, Rock

Spotting Bogus Email

Posted on April 15, 2016March 2, 2017 by Swamp_Keeper

Do you know how to spot a bogus email? Email has become the lifeblood for many companies, allowing us to connect and communicate globally almost instantly. But with email a serious risk is created, both to you and those you communicate with. Those who use the Internet world for evil Continue Reading

Posted In Global Security, Identity Theft, Information SecurityTagged In Email, End Users

Ashley, Hillary, and the OPM – We are from the government, here to help

Posted on April 12, 2016May 6, 2022 by Swamp_Keeper

Let me start by saying I’m a full on patriot. Flag waving, Anthem signing, lover of America. So before you able me as someone against the government stopping terrorist do on thing- STOP IT. The info security wold is abuzz with the latest breach- Ashley Madison, and I hope that Continue Reading

Posted In Global Security, Information SecurityTagged In Semi Lucid Rants

Posts navigation

Previous 1 2 3 Next

RSS Krebs on Security

  • Okta: Breach Affected All Customer Support Users November 29, 2023
  • ID Theft Service Resold Access to USInfoSearch Data November 28, 2023
  • Alleged Extortioner of Psychotherapy Patients Faces Trial November 16, 2023
  • Microsoft Patch Tuesday, November 2023 Edition November 14, 2023
  • It’s Still Easy for Anyone to Become You at Experian November 11, 2023

RSS Dark Reading

  • Ex-Cybersecurity Adviser to Bush, Obama Weighs in On Current Admin November 29, 2023
  • Code Scanner by Piiano Helps Enterprises Prevent Data Leaks Proactively November 29, 2023
  • XM Cyber Launches Kubernetes Exposure Management to Intelligently Protect Critical Container Environments November 29, 2023
  • 1Kosmos Unifies Identity Verification User Journeys Across Web and Mobile Platforms November 29, 2023
  • How a Teenage Saudi Hacker Went From Lockpicking to Ransomware November 29, 2023

RSS Vulnerabilities

RSS Krebs on Security

  • Okta: Breach Affected All Customer Support Users November 29, 2023
  • ID Theft Service Resold Access to USInfoSearch Data November 28, 2023
  • Alleged Extortioner of Psychotherapy Patients Faces Trial November 16, 2023
  • Microsoft Patch Tuesday, November 2023 Edition November 14, 2023
  • It’s Still Easy for Anyone to Become You at Experian November 11, 2023

RSS Dark Reading

  • Ex-Cybersecurity Adviser to Bush, Obama Weighs in On Current Admin November 29, 2023
  • Code Scanner by Piiano Helps Enterprises Prevent Data Leaks Proactively November 29, 2023
  • XM Cyber Launches Kubernetes Exposure Management to Intelligently Protect Critical Container Environments November 29, 2023
  • 1Kosmos Unifies Identity Verification User Journeys Across Web and Mobile Platforms November 29, 2023
  • How a Teenage Saudi Hacker Went From Lockpicking to Ransomware November 29, 2023
Copyright All rights reserved | Theme: Flash Blog by Unitedtheme.