Profile

Cover photo
Tom Eston
Works at SecureState
Lived in Area 51, Nevada
473 followers|10,416 views
AboutPostsPhotosVideos+1'sReviews

Stream

Tom Eston

General Discussion  - 
 
Some fun I've been working on...
3
Add a comment...

Tom Eston

Shared publicly  - 
1
1
Add a comment...

Tom Eston

Shared publicly  - 
 
Charles Moore originally shared:
 
Happy holidays!
1
1
Add a comment...

Tom Eston

Shared publicly  - 
 
Matthew Neely originally shared:
 
SecureState now has an official Google+ site. Please add it to one of your circles to get updates on the blogs, research, white papers and tools that SecureState releases.
We Are Your Security Team
1
Add a comment...
In his circles
202 people
Have him in circles
473 people
Chad Sturgill's profile photo
Brian Carmen's profile photo

Tom Eston

Shared publicly  - 
 
I'm mentoring SANS Security 542 in August, in Cleveland! Registration is open!
1
Add a comment...

Tom Eston

Shared publicly  - 
1
Add a comment...

Tom Eston

Shared publicly  - 
 
Spencer McIntyre originally shared:
 
The Exploit Monday blog released "PowerSyringe," a Power Shell version of my Syringe injection utility that I released with SecureState. They've added in support for 64-bit injection, which I'm excited to see, and over all it looks like a great little tool.
1
Add a comment...
People
In his circles
202 people
Have him in circles
473 people
Chad Sturgill's profile photo
Brian Carmen's profile photo
Work
Employment
  • SecureState
    Manager, Profiling & Penetration Team, present
Basic Information
Gender
Male
Story
Tagline
Security affectionado, consultant, researcher, blogger, podcaster.
Places
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
Previously
Area 51, Nevada
Links
Tom Eston's +1's are the things they like, agree with, or want to recommend.
Social Media Security Podcast 34 – Facebook Privacy, LinkedIn Scammers, ...
socialmediasecurity.com

Social Media Security is a monthly podcast about news and hot topics in the world of social media security.

Top 5 Security and Privacy Implications from Apple's WWDC
blog.securestate.com

Apple announced major changes for Apple products and software at WWDC 2014. What are the security and privacy impacts for user security and

Red or Blue, I'm Usually The Only Woman On The Team -- Dark Reading
www.darkreading.com

Women are still few and far between in the cybersecurity field

SecureState Releases Black POS Malware Scanning Tool -- Dark Reading
www.darkreading.com

Black POS is the reported culprit behind recent retail data breaches

Phishing Like A Monarch With King Phisher - SecureState
blog.securestate.com

SecureState releases their newest open-source project, a tool designed to run email-based social engineering campaigns, dubbed “King-Phisher

The Target and Neiman Marcus Breaches - SecureState
blog.securestate.com

On the heels of the largest breach affecting the retail industry at Target, comes yet another breach of credit card numbers and potentially

Top 5 Security Settings for Apple iPhones and iPads
blog.securestate.com

Apple mobile devices are among the most popular gadgets today. In fact, Apple reports that 250 million iOS devices have been sold and 18 mil

It’s Never Too Early to Teach Your Kids about Passwords - SecureState
blog.securestate.com

If kids aren't taught basic device security or learn password management skills, we’re setting our kids up for long term failure from a secu

Social Media Security Podcast 32 – The Privacy Paradox, Twitter Hacks, F...
socialmediasecurity.com

Social Media Security is a monthly podcast about news and hot topics in the world of social media security.

deviantART
plus.google.com

Where ART meets application!

Introducing Termineter 2 - SecureState
blog.securestate.com

C12.22 support is a large enhancement to Termineter 2. It will also include additional modules and improvements based on feedback from the c

Are You Over-Sharing? - SecureState
blog.securestate.com

Being cognizant of your online footprint promotes personal safety and deters those who would exploit the features of Social Media for nefari

The Importance of Letting the Penetration Tester Test - SecureState
blog.securestate.com

It is important to allow a penetration tester to conduct the assessment to the fullest of their abilities in order to get the most value fro

2013 Privacy
blog.securestate.com

Hopefully my foggy crystal ball outperforms the 12/21/12 Mayan prognosticators. 2013 promises to be landmark year as it relates to the priva

The New Facebook Graph Search: How to Protect Your Privacy
blog.securestate.com

Facebook has been making significant design and UI changes and has rolled out a significant change in the way you search for information on

Firebird SQL Stack Buffer Overflow (CVE-2013-2492) - SecureState
blog.securestate.com

The SecureState Research and Innovation team found a critical flaw in the latest, stable release of Firebird SQL. New release for the Metasp

Introducing (Leeroy) Jenkins: A Penetration Testers New Best Friend - Se...
blog.securestate.com

Typically on a penetration test there are several attacks the consultant will attempt first. These attacks generally are targeted at the “lo

Mobile App Security Series: What Else is Your Instagram Sharing? - Secur...
blog.securestate.com

In the last blog in the Mobile App Security series we covered Insecure Data Storage and how data being stored locally on your device may be

SecureState
plus.google.com

We Are Your Security Team

New Accounting System Hack Could Cause 'Mayhem' | threatpost
threatpost.com

Proof-of-concept code presented this week at Black Hat Abu Dhabi targets accounting systems and financial software such as Microsoft Dynamic

Public - 9 months ago
reviewed 9 months ago
1 review
Map
Map
Map