Blog Posts Tagged with "Metadata"


Security and Privacy for Microsoft Office 2010 Users

June 27, 2012 Added by:Ben Rothke

Encryption, privacy, data protection, and macro security are but a few of the vital capabilities for anyone using Microsoft Office - or any office suite for that matter. Author Mitch Tulloch shows how to take control of the Microsoft Office 2010 experience and use the many security and privacy features...

Comments  (0)


AQ Air: Mostly Hot - Not So Interesting

April 12, 2012 Added by:Infosec Island Admin

In the rar file that was uploaded to multiple locker sites were five video files that were taken from the internet and re-purposed for the release. Metadata from the files shows that they were handled on a Windows machine using the following software...

Comments  (0)


Metadata: A Pentester’s Best Friend

February 17, 2012 Added by:Jake Garlie

Most modern productivity software will automatically insert this information into documents for benefits such as collaboration. However, if not removed before being published to a website, metadata can put an organization at risk...

Comments  (0)


Smart Phone Privacy and Anonymizing the Nokia N900

May 08, 2011 Added by:Kyle Young

A lot of people are now using and relying on smart phones. Part of what makes these devices so ’smart’, is their ability to gather information on the user and use this information.The problem with this is that a lot of private information is being gathered...

Comments  (2)


Traitorware Enabled Devices Track Your Every Move

December 27, 2010 Added by:Headlines

If Apple puts a particularly creepy patent it has recently applied for into use, you can look forward to a day when your iPhone may record your voice, take a picture of your location, record your heartbeat, and send that information back to the mothership...

Comments  (0)


Metadata Analysis With FOCA 2.5

August 19, 2010 Added by:shawn merdinger

FOCA is a very powerful tool that will use search engines to discover all types of files on a target's website, download the files, and extract the metadata for further analysis to use in other tools, such as Social Engineering Toolkit...

Comments  (3)