Brian Donohue

“We are what we pretend to be, so we must be careful about what we pretend to be.” ― Kurt Vonnegut

181 articles

Hacking Humans

Go ahead and add insulin pumps and pacemakers to the ever-expanding list of computer-like-devices that contain bugs and are therefore vulnerable to exploit. That’s right, that little metal thing inside

Immune No More: An Apple Story

For a very long time, Apple and its pseudo-religious user-base prided itself on being a platform free of malware; those days are inarguably and unequivocally over. Its emergence as the

apt_title

What is APT?

APT stands for advanced persistent threat. It became famous following a New York Times exposé detailing a month’s long attack campaign in which a Chinese military unit now known as

exploit_title

What is an Exploit?

If Achilles’s heel was his vulnerability in the Iliad, then Paris’s poison tipped arrow was the exploit. Quite literally, an exploit is the device or – more often than not

google privacy

No Privacy at Google I/O

Google Glass was among the main attractions at the Mountain View, California search giant’s developer-centric I/O conference in San Francisco last week. We had high hopes that Google would address