Profile

Cover photo
Kimberly Crawley
Works at InfoSec Institute
Attended George Brown College
Lives in Toronto, Ontario, Canada
36,842 followers|2,292,771 views
AboutPostsPhotosYouTubeReviews

Stream

Kimberly Crawley

Shared publicly  - 
The other day on the Bill Maher show, you said that young women were supporting Bernie Sanders in such large numbers because 'the boys are with Bernie.' [CNN] This statement represents one of the worst pronouncements on gender we have seen from a notable person in this election season. It's particularly significant because you are a feminist icon whose leadership continues to inspire, and because the statement was such a sweeping condemnation ...
1
Add a comment...

Kimberly Crawley

Shameless Plug :)  - 
 
When you read about security attacks involving mobile network technology, typically they’re incidents that target mobile devices used by consumers.

All kinds of malware has been found over the years that targets iOS and Android. Isolate the malicious files, wait for antivirus software to acquire signatures a day or so after a zero-day is discovered, run it, reboot your device, you’re all set.

That’s not what Regin is, oh no. Regin is the story of a global cyberattack mechanism on a massive scale. Hold on to your seats, because I’m going to take you on a bumpy ride.

#infosec #malware #cyberwarfare #cybersecurity

By Kim Crawley. When you read about security attacks involving mobile network technology, typically they're incidents that target mobile devices used by consumers. All kinds of malware has been found over the years that targets iOS and Android. Isolate the malicious files, wait for antivirus ...
2
Add a comment...
 
Horrible security vulnerabilities are a major factor in the downfall of Adobe Flash.

My analysis here...

#infosec #webdevelopment #cybersecurity #tech
1
Add a comment...

Kimberly Crawley

Shameless Plug :)  - 
 
Horrible security vulnerabilities are a major factor in the downfall of Adobe Flash.

My analysis is here...

#infosec #webdevelopment #web #cybersecurity #tech
3
1
Ed's Computer Solutions's profile photo
Add a comment...
 
Are you still using PGP in 2016?

#infosec #encryption #cryptography

By Kim Crawley. A few weeks ago, I wrote an article for 2600 Magazine. (If you're curious, publication has been confirmed and you'll probably see it in the Winter 2014-2015 issue.) The form email you get when you email an article submission says: “We don't recommend sending PGP encrypted ...
4
Bloo Alien's profile photoSerge Ribalchenko's profile photoJosef Bureš's profile photoLouis Kowolowski's profile photo
12 comments
 
+Josef Bureš many (perhaps it's still all but Google) major email providers don't support TLS. The only way to get what you're talking about is to force TLS only on every SMTP connection. If you do that, I suspect you will be quite limited in who you can talk to.
Add a comment...

Kimberly Crawley

Shared publicly  - 
9
1
alex moon's profile photoSergio Bassan's profile photo
 
Ok where did you live
Add a comment...
 
When you read about security attacks involving mobile network technology, typically they’re incidents that target mobile devices used by consumers.

All kinds of malware has been found over the years that targets iOS and Android. Isolate the malicious files, wait for antivirus software to acquire signatures a day or so after a zero-day is discovered, run it, reboot your device, you’re all set.

That’s not what Regin is, oh no. Regin is the story of a global cyberattack mechanism on a massive scale. Hold on to your seats, because I’m going to take you on a bumpy ride.

#infosec #malware #cyberwarfare #cybersecurity
By Kim Crawley. When you read about security attacks involving mobile network technology, typically they're incidents that target mobile devices used by consumers. All kinds of malware has been found over the years that targets iOS and Android. Isolate the malicious files, wait for antivirus ...
6
2
John Doe (Faraday Defcon)'s profile photoLode Van Beethoven's profile photoFriedrich der Große's profile photo
 
I was at our local monthly Defcon meeting tonight...[name deleted, not me]  gave a demo with a small GUI [s]he coded [deleted what I said here, sorry]  that revealed all usernames and passwords of any cisco router online in the IP ranges he selected that didnt have RW changed to RO in the public settings (which is RW by default). I was amazed how much hardware is out there that is so vulnerable.    
Add a comment...
 
When you read about security attacks involving mobile network technology, typically they’re incidents that target mobile devices used by consumers.

All kinds of malware has been found over the years that targets iOS and Android. Isolate the malicious files, wait for antivirus software to acquire signatures a day or so after a zero-day is discovered, run it, reboot your device, you’re all set.

That’s not what Regin is, oh no. Regin is the story of a global cyberattack mechanism on a massive scale. Hold on to your seats, because I’m going to take you on a bumpy ride.

#infosec #malware #cyberwarfare #cybersecurity

By Kim Crawley. When you read about security attacks involving mobile network technology, typically they're incidents that target mobile devices used by consumers. All kinds of malware has been found over the years that targets iOS and Android. Isolate the malicious files, wait for antivirus ...
1
Add a comment...
 
Horrible security vulnerabilities are a major factor in the downfall of Adobe Flash.

My analysis is here...

#infosec #webdevelopment #web #cybersecurity #tech
7
1
John Doe (Faraday Defcon)'s profile photoFriedrich der Große's profile photo
 
“Look ma, this ain’t GeoCities no more!” lol ded! +1
Add a comment...

Kimberly Crawley

Shared publicly  - 
16
2
Michelle Cameron's profile photoalex moon's profile photoLode Van Beethoven's profile photoSergio Bassan's profile photo
3 comments
 
+Michelle Cameron hello Michelle nice meeting you hear like us to be a good friend I am single man 
Add a comment...

Kimberly Crawley

Shameless Plug :)  - 
 
Are you still using PGP in 2016?

#infosec #cybersecurity #encryption #cryptography
By Kim Crawley. A few weeks ago, I wrote an article for 2600 Magazine. (If you're curious, publication has been confirmed and you'll probably see it in the Winter 2014-2015 issue.) The form email you get when you email an article submission says: “We don't recommend sending PGP encrypted ...
1
Add a comment...

Kimberly Crawley

Shared publicly  - 
 
Here I was on the TTC on Thursday, with my husband +Sean Rooney. The lighting in the new subway cars is very flattering.

#TTC #Toronto #selfie
10
Add a comment...
People
Have her in circles
36,842 people
taga palanit's profile photo
Alan Dix's profile photo
Lise Rehberlik's profile photo
TUTI Kids's profile photo
Jameela Begum's profile photo
Pankaj Kumar's profile photo
Maribel  Adorno's profile photo
natraj kamboj's profile photo
Chad Mason's profile photo
Work
Occupation
IT Security Researcher and Curriculum Contributor
Skills
Scientific research, information security, technical writing and journalism
Employment
  • InfoSec Institute
    IT Security Researcher, 2011 - present
    I do academic research and curriculum development in the field of IT security. I share knowledge about how to keep data secure.
  • Financial Outsource Inc.
    IT Support, 2011 - present
  • Somewhat Subversive Freelancing
    tech support/journalism/web development/cheerleading/people hacking/conspiring, 1996 - present
  • InfoSec Institute
    IT Security Researcher, Associate Editor and Curriculum Contributor, 2010 - present
    I'm a frequent contributor and associate editor of articles on the InfoSec Institute's Resources website. I'm also contributing to their IT certification exam study curriculum.
Places
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
Currently
Toronto, Ontario, Canada
Previously
Toronto, Ontario, Canada - Mississauga, Ontario, Canada - Huntsville, Ontario, Canada - Burlington, Ontario, Canada - Hamilton, Ontario, Canada - White Rock, British Columbia, Canada
Story
Tagline
Admit it. You can't figure me out.
Introduction
I work in IT, and I do a lot of writing and blogging on the side. I love Japanese food, web development, candy, technology, jazz/funk/R&B/prog rock, gaming, radical philosophers, and trying to be witty... whether or not I succeed.
Bragging rights
I've mixed and mingled with pretty much EVERY WALK OF LIFE. NOTHING shocks me. I'm tough as nails. I've survived the worst, and lived to tell the tale. And what I know about computing can be very frightening.
Education
  • George Brown College
    Information Technology, 2009 - 2010
Basic Information
Gender
Female
Birthday
January 13
Relationship
Engaged
Other names
Kim, Kimberly Faye Crawley, Creepy Crawley, Crow Girl, Miss Raven,the Great Dark Goddess of Geekdom
Apps with Google+ Sign-in
  • Blendoku 2
  • Fallout Shelter
The Waverley Hotel breaks the law as follows: They spontaneously double rates of month to month rooming houses- a violation of Landlord/Tenant Laws. (We've verified this with our lawyers. Even if a hotel rents month to month, they are subject to Landlord/Tenant law as it pertains to rooming houses. They illegally refused me entry into my unit. The place is infested with bedbugs, cockroaches, mice, and is otherwise unhygienic. Many residents of the hotel are confirmed prostitutes and drug dealers.
• • •
Quality: Poor - FairFacilities: Poor - FairService: Poor - Fair
Public - 3 years ago
reviewed 3 years ago
1 review
Map
Map
Map