top of page
![](https://static.wixstatic.com/media/8d86ad_a5d820f770fd447a93527bec5b2c1e29~mv2.png/v1/fill/w_1024,h_800,al_c,q_90,enc_avif,quality_auto/8d86ad_a5d820f770fd447a93527bec5b2c1e29~mv2.png)
![WhatsApp Image 2023-04-21 at 11.34.24 AM.jpeg](https://static.wixstatic.com/media/8d86ad_eefe0e6d57e740589dc06540e5944ebf~mv2.jpeg/v1/fill/w_600,h_228,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/WhatsApp%20Image%202023-04-21%20at%2011_34_24%20AM.jpeg)
Search
![WiFi Pineapple: a WiFi attacker’s pocket-sized superweapon](https://static.wixstatic.com/media/8d86ad_ddad911a5aa2488f8274d6ea8f832038~mv2.png/v1/fill/w_283,h_159,fp_0.50_0.50,q_95,enc_auto/8d86ad_ddad911a5aa2488f8274d6ea8f832038~mv2.webp)
ghostexodusfreelan2
Oct 1, 20247 min read
WiFi Pineapple: a WiFi attacker’s pocket-sized superweapon
What you’re about to read is an expansion of an earlier article I wrote, ‘The powerful cyberweapons that can fit in your pocket.’ In this...
40
![](https://static.wixstatic.com/media/8d86ad_d75fbf8147414373b576a5a7878fe4d4~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8d86ad_d75fbf8147414373b576a5a7878fe4d4~mv2.webp)
![Hackers and law enforcement: to be or not to be?](https://static.wixstatic.com/media/8d86ad_d75fbf8147414373b576a5a7878fe4d4~mv2.jpg/v1/fill/w_283,h_159,fp_0.50_0.50,q_90,enc_auto/8d86ad_d75fbf8147414373b576a5a7878fe4d4~mv2.webp)
ghostexodusfreelan2
Jul 19, 20246 min read
Hackers and law enforcement: to be or not to be?
Hackers and law enforcement have a colorful history. Pick any decade, and it’s chock-full of arrests and heavy-handed prosecutions, which...
100
![](https://static.wixstatic.com/media/8d86ad_b4dfde3438dc4d5f8c64fd200c3b6fd2~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8d86ad_b4dfde3438dc4d5f8c64fd200c3b6fd2~mv2.webp)
![Facebook and the fight for #opchildsafety](https://static.wixstatic.com/media/8d86ad_b4dfde3438dc4d5f8c64fd200c3b6fd2~mv2.jpeg/v1/fill/w_282,h_159,fp_0.50_0.50,q_90,enc_auto/8d86ad_b4dfde3438dc4d5f8c64fd200c3b6fd2~mv2.webp)
ghostexodusfreelan2
Dec 24, 20234 min read
Facebook and the fight for #opchildsafety
When the news broke on Wednesday, December 6th, that Facebook (Meta) and its offshoot Instagram were finally being served with a lawsuit...
300
![](https://static.wixstatic.com/media/8d86ad_083226d148744802ac7bde47ba9a890d~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8d86ad_083226d148744802ac7bde47ba9a890d~mv2.webp)
![The psychology of internet trolls](https://static.wixstatic.com/media/8d86ad_083226d148744802ac7bde47ba9a890d~mv2.jpeg/v1/fill/w_283,h_159,fp_0.50_0.50,q_90,enc_auto/8d86ad_083226d148744802ac7bde47ba9a890d~mv2.webp)
ghostexodusfreelan2
Dec 24, 20235 min read
The psychology of internet trolls
Trolling is a form of cyberbullying. It involves posting malicious or harassing comments on social media platforms to hurt or humiliate...
400
![](https://static.wixstatic.com/media/8d86ad_812ea0e9426841c9bb168878cebfb2cb~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8d86ad_812ea0e9426841c9bb168878cebfb2cb~mv2.webp)
![Exclusive: OSINT detectives discover crucial hints in the mystery of the teenager’s disappearance](https://static.wixstatic.com/media/8d86ad_812ea0e9426841c9bb168878cebfb2cb~mv2.jpg/v1/fill/w_283,h_159,fp_0.50_0.50,q_90,enc_auto/8d86ad_812ea0e9426841c9bb168878cebfb2cb~mv2.webp)
ghostexodusfreelan2
Nov 20, 20239 min read
Exclusive: OSINT detectives discover crucial hints in the mystery of the teenager’s disappearance
Her name is Tatum Edwards. She was 18 years old when she vanished without a trace in 2021. She didn’t pack her bags or take any family...
380
![](https://static.wixstatic.com/media/8d86ad_540d40a0d2ea4520911e9c00f355a938~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8d86ad_540d40a0d2ea4520911e9c00f355a938~mv2.webp)
![Experiment: How easy it was for me to influence Anonymous hacktivists](https://static.wixstatic.com/media/8d86ad_540d40a0d2ea4520911e9c00f355a938~mv2.jpg/v1/fill/w_282,h_159,fp_0.50_0.50,q_90,enc_auto/8d86ad_540d40a0d2ea4520911e9c00f355a938~mv2.webp)
ghostexodusfreelan2
Nov 20, 20235 min read
Experiment: How easy it was for me to influence Anonymous hacktivists
To say that we are living in a volatile time would be a brazen understatement. Since the onset of #OpRussia and successive operations,...
361
![](https://static.wixstatic.com/media/8d86ad_fa07f8109af64ad2b3257fbaf3c42be7~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8d86ad_fa07f8109af64ad2b3257fbaf3c42be7~mv2.webp)
![Hackers explained: an evolution of curiosity and chaos](https://static.wixstatic.com/media/8d86ad_fa07f8109af64ad2b3257fbaf3c42be7~mv2.jpg/v1/fill/w_283,h_159,fp_0.50_0.50,q_90,enc_auto/8d86ad_fa07f8109af64ad2b3257fbaf3c42be7~mv2.webp)
ghostexodusfreelan2
Nov 20, 20237 min read
Hackers explained: an evolution of curiosity and chaos
The first hacking incident occurred in 1878, long before computers were invented. It happened two years after the launch of Alexander...
160
![](https://static.wixstatic.com/media/8d86ad_b08c73f4f440453d84a6b912ab9e455e~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8d86ad_b08c73f4f440453d84a6b912ab9e455e~mv2.webp)
![Anonymity should be your lifestyle choice](https://static.wixstatic.com/media/8d86ad_b08c73f4f440453d84a6b912ab9e455e~mv2.jpg/v1/fill/w_283,h_159,fp_0.50_0.50,q_90,enc_auto/8d86ad_b08c73f4f440453d84a6b912ab9e455e~mv2.webp)
ghostexodusfreelan2
Oct 19, 20236 min read
Anonymity should be your lifestyle choice
“OPSEC is religion,” is a saying I repeat often. It suggests that guarding privacy and anonymity online should be considered a...
510
![](https://static.wixstatic.com/media/8d86ad_e6301730d23f41a6b3c7e297989765cd~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8d86ad_e6301730d23f41a6b3c7e297989765cd~mv2.webp)
![#OpChildSafety: cyber vigilantes and the fight for innocence](https://static.wixstatic.com/media/8d86ad_e6301730d23f41a6b3c7e297989765cd~mv2.jpg/v1/fill/w_282,h_159,fp_0.50_0.50,q_90,enc_auto/8d86ad_e6301730d23f41a6b3c7e297989765cd~mv2.webp)
ghostexodusfreelan2
Aug 21, 20235 min read
#OpChildSafety: cyber vigilantes and the fight for innocence
The fight to protect innocence is an insurmountable power struggle between cyber vigilantes and online predators against children. While...
470
![The passing of Kevin Mitnick: behind the eyes of a hacker](https://static.wixstatic.com/media/8d86ad_d97b6f7b5d1240028e1eab82f437346d~mv2.png/v1/fill/w_283,h_159,fp_0.50_0.50,q_95,enc_auto/8d86ad_d97b6f7b5d1240028e1eab82f437346d~mv2.webp)
ghostexodusfreelan2
Jul 21, 20236 min read
The passing of Kevin Mitnick: behind the eyes of a hacker
by Mitnick Security Consulting the untimely death of hacker legend and social engineer mastermind Kevin David Mitnick. Mitnick’s...
420
![](https://static.wixstatic.com/media/8d86ad_712e666f73114c37914a03a4ab2c04b8~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8d86ad_712e666f73114c37914a03a4ab2c04b8~mv2.webp)
![A Splinter in the Network: Weaponizing Mini PCs](https://static.wixstatic.com/media/8d86ad_712e666f73114c37914a03a4ab2c04b8~mv2.jpeg/v1/fill/w_283,h_159,fp_0.50_0.50,q_90,enc_auto/8d86ad_712e666f73114c37914a03a4ab2c04b8~mv2.webp)
ghostexodusfreelan2
Feb 2, 20235 min read
A Splinter in the Network: Weaponizing Mini PCs
You typically trust the people you work with. After all, you interact with them daily and develop camaraderie. Some you feel comfortable...
1060
![Web Browsers: An Overlooked Vulnerable Nerve Center](https://static.wixstatic.com/media/8d86ad_22df81db50c3470d8b0edeea0239e1a4~mv2.png/v1/fill/w_282,h_159,fp_0.50_0.50,q_95,enc_auto/8d86ad_22df81db50c3470d8b0edeea0239e1a4~mv2.webp)
ghostexodusfreelan2
Feb 2, 20235 min read
Web Browsers: An Overlooked Vulnerable Nerve Center
You walk into a coffee shop, order something from the menu, and sit down with your laptop. You connect to the public Wi-Fi and begin...
600
![](https://static.wixstatic.com/media/8d86ad_33d48f88d0594b8f9edf5a19a6e6bcb2~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8d86ad_33d48f88d0594b8f9edf5a19a6e6bcb2~mv2.webp)
![Pwning the Box Over Remote Desktop Protocol](https://static.wixstatic.com/media/8d86ad_33d48f88d0594b8f9edf5a19a6e6bcb2~mv2.jpeg/v1/fill/w_283,h_159,fp_0.50_0.50,q_90,enc_auto/8d86ad_33d48f88d0594b8f9edf5a19a6e6bcb2~mv2.webp)
ghostexodusfreelan2
Jan 21, 20235 min read
Pwning the Box Over Remote Desktop Protocol
Many years ago, a group of hackers sat at their computers late at night. It was their routine every night. They listened to music, ate...
550
![](https://static.wixstatic.com/media/8d86ad_39ab542a9e2049bdb49d5271e86a27f2~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8d86ad_39ab542a9e2049bdb49d5271e86a27f2~mv2.webp)
![DNS Spoofing Attacks And How To Protect Yourself](https://static.wixstatic.com/media/8d86ad_39ab542a9e2049bdb49d5271e86a27f2~mv2.jpg/v1/fill/w_283,h_159,fp_0.50_0.50,q_90,enc_auto/8d86ad_39ab542a9e2049bdb49d5271e86a27f2~mv2.webp)
ghostexodusfreelan2
Jan 20, 20234 min read
DNS Spoofing Attacks And How To Protect Yourself
Sep 22, 2021 Just like any other day you come into work and take your place at the cube farm and power up your workstation PC. You enter...
360
![](https://static.wixstatic.com/media/8d86ad_f699bb3eaf77450c864d4a26a52f4b49~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8d86ad_f699bb3eaf77450c864d4a26a52f4b49~mv2.webp)
![A Closer Look At Hacktivists Thwarting Terrorist Attacks](https://static.wixstatic.com/media/8d86ad_f699bb3eaf77450c864d4a26a52f4b49~mv2.jpg/v1/fill/w_282,h_159,fp_0.50_0.50,q_90,enc_auto/8d86ad_f699bb3eaf77450c864d4a26a52f4b49~mv2.webp)
ghostexodusfreelan2
Jan 20, 20235 min read
A Closer Look At Hacktivists Thwarting Terrorist Attacks
Hollywood and headlines are largely responsible for what we know about hackers. Also, factor in the unfortunate experiences of system...
2051
![](https://static.wixstatic.com/media/8d86ad_463a7a63e4a943a08d82a9825e2e0a63~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8d86ad_463a7a63e4a943a08d82a9825e2e0a63~mv2.webp)
![Insider Threats: When Trust Is Broken](https://static.wixstatic.com/media/8d86ad_463a7a63e4a943a08d82a9825e2e0a63~mv2.jpg/v1/fill/w_283,h_159,fp_0.50_0.50,q_90,enc_auto/8d86ad_463a7a63e4a943a08d82a9825e2e0a63~mv2.webp)
ghostexodusfreelan2
Jan 13, 20236 min read
Insider Threats: When Trust Is Broken
Aug 26, 2021 You see him every evening right as you’re about to clock out and get ready for the drive home after a full day’s work. He...
470
![](https://static.wixstatic.com/media/8d86ad_67f073f8dc9146a18d29f69c26c1da13~mv2.jpg/v1/fill/w_244,h_244,fp_0.50_0.50,lg_1,q_30,blur_30,enc_auto/8d86ad_67f073f8dc9146a18d29f69c26c1da13~mv2.webp)
![A Hacktivist's Encounter With a Cunning Scammer](https://static.wixstatic.com/media/8d86ad_67f073f8dc9146a18d29f69c26c1da13~mv2.jpg/v1/fill/w_174,h_159,fp_0.50_0.50,q_90,enc_auto/8d86ad_67f073f8dc9146a18d29f69c26c1da13~mv2.webp)
ghostexodusfreelan2
Jan 13, 20235 min read
A Hacktivist's Encounter With a Cunning Scammer
Dec 9, 202 I have always prided myself as being impervious to scams. After all, scams used to be part of my hacker toolkit. Hackers can...
481
![](https://static.wixstatic.com/media/8d86ad_2168bb47672a4213a7968b9050609079~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8d86ad_2168bb47672a4213a7968b9050609079~mv2.webp)
![RTF Injection Techniques Rise With APT Phishing Attacks](https://static.wixstatic.com/media/8d86ad_2168bb47672a4213a7968b9050609079~mv2.jpg/v1/fill/w_282,h_159,fp_0.50_0.50,q_90,enc_auto/8d86ad_2168bb47672a4213a7968b9050609079~mv2.webp)
ghostexodusfreelan2
Jan 10, 20234 min read
RTF Injection Techniques Rise With APT Phishing Attacks
Back in the spring of 2007, I got my hands dirty with phishing attacks. Every year since its inception in the mid-1990s, phishing has...
320
![](https://static.wixstatic.com/media/8d86ad_54accf86433d4769a647fa2d5fe2ea61~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8d86ad_54accf86433d4769a647fa2d5fe2ea61~mv2.webp)
![To Catch an Online Predator](https://static.wixstatic.com/media/8d86ad_54accf86433d4769a647fa2d5fe2ea61~mv2.jpg/v1/fill/w_283,h_159,fp_0.50_0.50,q_90,enc_auto/8d86ad_54accf86433d4769a647fa2d5fe2ea61~mv2.webp)
ghostexodusfreelan2
Jan 10, 20234 min read
To Catch an Online Predator
She sits at her computer, sipping from a crystal glass of wine while listening to music. The mixture drives her warfare like the...
900
![](https://static.wixstatic.com/media/8d86ad_5ee1000a9e68430e9e45971ce95a520d~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8d86ad_5ee1000a9e68430e9e45971ce95a520d~mv2.webp)
![Taking a Deeper Look Into New UEFI Invisible Rootkit](https://static.wixstatic.com/media/8d86ad_5ee1000a9e68430e9e45971ce95a520d~mv2.jpg/v1/fill/w_283,h_159,fp_0.50_0.50,q_90,enc_auto/8d86ad_5ee1000a9e68430e9e45971ce95a520d~mv2.webp)
ghostexodusfreelan2
Jan 4, 20234 min read
Taking a Deeper Look Into New UEFI Invisible Rootkit
The thing about malware is that anti-malware signatures assign a unique hash that is used to identify it. If it can be detected before...
290
bottom of page