Profile cover photo
Profile photo
John Abraham
45 followers
45 followers
About
John's posts

Post has attachment
Configuring WiFi Pineapple Nano on Mac OS X
The WiFi Pineapple documentation is well documented, but there were a couple of extra steps to configure the Nano on a Mac. It looked like some others were bumping into some issues so I thought I'd document what worked for me. The steps below worked for me ...

Post has attachment
What Corporate Boards Need to Know About Information Security For 2015
Below are some recurring themes around security that will benefit directors. While providing leadership in security is hard, boards can improve their governance by groking these important aspects of security for 2015. Security is a competitive advantage.  S...

Post has attachment
SYOD - Secure Your Own Device
SYOD - Secure Your Own Device - Free iPhone App iPhone security for everyone, because i nformation security is everyone's responsibility. SYOD was created in this spirit. It helps users not only secure their iPhone, but educate them about why these settings...

Post has attachment
Sony Breach: Will Visualizing Sony Implosion Lead to Improved IT Governance
So I've been watching breaches for many years and the latest Sony breach is awe inspiring in terms of the scale of the breach and maliciousness in intent; the breach seems to transcend the typical profiteering objectives and feels more like economic espiona...

Post has attachment
iPhone Anti-Phishing functionality: Doesn't seem to be working or up-to-date
The anti-phishing functionality in iOS doesn't seem to be working. According to Apple, when turned on the functionality should alert you if you click on a link to a known phishing site. Enabling this feature on my iPhone (5s running iOS version 8.1.2) seeme...

Post has attachment
Sony Breach - How A Hack Will Add Transparency To Your IT Practices
Having spent 15 years in security and building a security assessment company , which helps companies identify and mitigate security risk, I've been at ground-zero for many data breaches. I've seen the fallout. I've watched as companies that couldn't even a ...

Post has attachment
My Concept for the Cisco Internet of Things Innovation Grand Challenge
Here is the concept I just submitted for the Cisco's IoT Challenge : Deploy a network of fixed Bluetooth scanners throughout an urban area and/or transportation corridor to enable a region-wide alert/notification system for things: Bluetooth enabled devices...

Post has attachment
Bluetooth LE Captures from an item tracker
Item Tracker Bluetooth Device Captures Below shows another advertising strategy. This shows an advertising sequence between an item tracker from Phone Halo and the Bluescan app running on an Android device with BD_ADDR of  AC:22:0B:45:87:55. The second capt...

Post has attachment
Gimbal Bluetooth iBeacon Advertising
Gimbal iBeacons Below are some packet captures from the Gimbal Proxmity Beacon Series 10 . These are advertisements from two devices. First 5 seconds For the first five seconds the devices appear to broadcast their Bluetooth addresses. Notice the AdvA for e...

Post has attachment
Analyzing Bluetooth Advertising with Ubertooth
Bluetooth Active Scanning Example in my last post, Understanding Bluetooth Advertising Packets , I reviewed and consolidated some key elements of advertising packet format and data structure from the Bluetooth Core 4.1 Specification. In this post, I'll revi...
Wait while more posts are being loaded