Remove .Net Remove Exercises Remove Firewall Remove Internet
article thumbnail

Deception and Forensics for the Next Generation — Part 3: Meet the Deception Network

SecureWorld News

First, though, we need to get an idea of what I mean by a deception net. While it is true, of course, that deception nets evolved from honeypots, today's deception network is far and beyond that rather primitive technology. I have no lures (an actual resource such as a document or other file) for the purpose of this exercise.

Network 52
article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

That, of course, was not all, but it is an example of how someone -- anyone on the internet -- can take a photo or blog post or Yelp review from social media, or some other seemingly random open source item and tie it back to a crime. Which then I could configure to get on the internet, you know. Come sit next to me.