Snowden & Metadata + “”””””

Here are some random key quotes from Snowden’s new book that are of particular interest. On metadata : metadata is data about data ….. …communication(s) is rarely as revealing as its other elements—the unwritten, unspoken information that can expose the broader context and patterns of behaviour. He means to say the real evil of the […]


this weeks musings….. Risk is a factor in absolutely every decision we make. Ultimately, in a business scenario,I feel its the company ethos, the company culture, that has a bigger impact than a mandate from management when considering IT risk. The majority of companies now absolutely depend on their systems. A large fractured struggling company […]

Attack Ideas

As part of our Information Security week we were asked to create a potential social engineering attack plan. Here’s mine based upon a researched template. What do you think?? ………………………. “WORDPRESS ECOSYSTEM HACK” The WordPress ecosystem is known to have security vunerabilities, (Link:, mainly due to users not updating to the latest version of […]


Defined as: (in the context of information security) the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. From I listened to a podcast at the weekend with Tristan Harris. Formerly Design Ethicist at Google, Tristan is a world-renowned expert on how technology steers […]

PowerShell & Hashing #234grf#dfknsd#

Want to try some hashing? 🙂 This from the NSA! SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA).They are built using the Merkle–Damgård structure, from a one-way compression function itself built using the Davies–Meyer structure from a (classified) specialized block cipher. From Wikipedia @{Algorithm=SHA512; Hash=979749F8518909E46D4FAD54EED5E16DB8E644DD061370DEE715D4310E42B68BBB37E1D6F7B668D9E625BCC4212179689C9544E88848651CA54151E7BDF27E74; Path=C:\Users\********** This is the output of running […]