Home > Authors

Seth Fogie

Seth Fogie is the VP of Dallas-based Airscanner Corporation where he oversees the development of security software for the Window Mobile (Pocket PC) platform. He has co-authored numerous technical books on information security, including the best-selling Maximum Wireless Security and Windows Internet Security: Protecting Your Critical Data from Sams Publishing, Security Warrior from O'Reilly, and Cross Site Scripting Attacks: XSS Exploits and Defense from Syngress. Seth frequently speaks at IT and security conferences/seminars, including Black Hat, Defcon, CSI, and Dallascon. In addition, Seth has co-authored the HIPAA medical education course for the Texas Medical Associate. If you have any questions or comments for Seth, he can be reached at seth@airscanner.com.

1.
Getting Owned: The USB Keystroke Injection Attack
Oct 6, 2010
2.
Exploiting phpMyadmin: How to Get root in 15 Easy Steps
Nov 20, 2009
3.
Building the Ultimate Virtual Lab for Free, for Fun, and for Profit, Part 2
Feb 2, 2009
4.
Building the Ultimate Virtual Lab for Free, for Fun, and for Profit, Part 1
Jan 26, 2009
5.
Security Analysis of a Scan-to-PC Solution
Sep 12, 2008
6.
Turning the OLPC Into a Hacker’s Toolkit - Give One, Get Owned, Part 2
May 26, 2008
7.
Turning the OLPC Into a Hacker’s Toolkit - Give One, Get Owned, Part 1
May 19, 2008
8.
FlexiSPY Mobile Spyware: Monitoring Solution or Security Nightmare?
Mar 14, 2008
9.
The Eye-Fi: A Case Study in Next-Generation Application Security Issues
Feb 29, 2008
10.
Inside the Eye-Fi: Secrets of the First Wireless SD Card
Feb 22, 2008
11.
Inside the Everex gPC: A Look at How Far $200 and a Trip to Wal-Mart Can Get You
Nov 16, 2007
12.
Virtual Lock Picking of Windows Mobile Password Managers
Nov 2, 2007
13.
Reverse-Tethering the iPhone
Oct 26, 2007
14.
Inside Mobile-spy "Spouseware," Part 2
Oct 19, 2007
15.
iModded My iPhone, Part 2: The Wi-Phone Mod
Oct 19, 2007
16.
Inside Mobile-spy "Spouseware," Part 1
Oct 12, 2007
17.
iModded My iPhone, Part 1: Bling
Oct 12, 2007
18.
Owning the Wireless Camera (and Its User)
Sep 14, 2007
19.
Abusing and Misusing Wireless Cameras
Sep 7, 2007
20.
The Unfinished iPhone: iPhone vs. Windows Mobile
Jul 2, 2007
21.
A Student-Hacker Rematch at the Second Annual Collegiate Cyber Defense Competition
Mar 16, 2007
22.
Dissecting the Micro Mosquito Helicopter: Exposed and Explained
Jan 5, 2007
23.
Adding an External Antenna To Your Wii
Nov 28, 2006
24.
Wii Exposed: Wiinternals, Wii-motes, and a Teardown Wiideo
Nov 20, 2006
25.
The Glowing Logo Laptop Mod: Windows, Apples, and Penguins, Oh My!
Sep 15, 2006
26.
Airscanner Vulnerability Summary: Windows Mobile Security Software Fails the Test
Sep 1, 2006
27.
XSS, Cookies, and Session ID Authentication – Three Ingredients for a Successful Hack
Aug 11, 2006
28.
iRobot Scooba Exposed: What's Inside This Robotic Maid
Jun 2, 2006
29.
Nikon Coolpix P1 Wifi Camera: Exposed and Abused
May 4, 2006
30.
A Student-Hacker Showdown at the Collegiate Cyber Defense Competition
Mar 31, 2006
31.
Airpwn: Owning the Airwaves
Mar 3, 2006
32.
Video iPod Exposed: Guts to Glory, PSP Style
Feb 17, 2006
33.
The Atari-Xbox 3600: A Retro Mod for Your Next-Gen Gaming System
Dec 16, 2005
34.
PSP vs. iPod: Looking Beyond What's Trendy
Dec 9, 2005
35.
Xbox 360 Exposed
Nov 22, 2005
36.
PSP Emulators and ISOs: Playing Games from Other Consoles and Backing up Your UMDs
Sep 9, 2005
37.
Reduce, Recycle, Refurbish, Reuse: "Free Geek Penn" Rehabilitates Pennsylvania's Outdated Computers
Aug 26, 2005
38.
Score List Hacking: Lessons Learned by Cheating Your Way to Number One, Part 2 of 2
Aug 5, 2005
39.
Score List Hacking: Lessons Learned by Cheating Your Way to Number One, Part 1 of 2
Jul 29, 2005
40.
Adding an External Wi-Fi Antenna to Your PSP
Apr 11, 2005
41.
Web Browsing on the PSP
Mar 30, 2005
42.
First Look: Sony PSP
Mar 29, 2005
43.
PSP Exposed: Taking Apart the PlayStation Portable
Mar 29, 2005
44.
Building a Linux-Driven Digital Picture Frame, Part 2
Mar 25, 2005
45.
Building a Linux-Driven Digital Picture Frame, Part 1
Mar 18, 2005
46.
Securing Your Wireless PDA Connection
Mar 18, 2005
47.
Cracking Wi-Fi Protected Access (WPA), Part 2
Mar 11, 2005
48.
Cracking Wi-Fi Protected Access (WPA), Part 1
Mar 4, 2005
49.
High-Tech Crimes Revealed: An Interview with Stephen Branigan
Oct 22, 2004
50.
Reverse-Engineering the First Pocket PC Trojan, Part 2
Oct 8, 2004
51.
Reverse-Engineering the First Pocket PC Trojan, Part 1
Oct 1, 2004
52.
Details Emerge on the First Windows Mobile Virus (Part 3 of 3)
Sep 17, 2004
53.
Details Emerge on the First Windows Mobile Virus (Part 2 of 3)
Sep 10, 2004
54.
Details Emerge on the First Windows Mobile Virus (Part 1 of 3)
Sep 3, 2004
55.
Summer Brings Mosquito-Borne Malware (Part 3 of 3)
Aug 6, 2004
56.
Summer Brings Mosquito-Borne Malware (Part 2 of 3)
Jul 30, 2004
57.
Summer Brings Mosquito-Borne Malware (Part 1 of 3)
Jul 23, 2004
58.
Security Expert Gary McGraw on Black Hats, the U.S. Government, and Good vs. Evil
Jun 11, 2004
59.
Attack of the Clones: Is Lindows the Real Deal?
Feb 14, 2003
60.
For Wireless Security, First Understand Wireless Programming
Feb 14, 2003
61.
Close Encounters of the Hacker Kind - Part 2 of the Story From the Front Line
Jan 10, 2003
62.
Close Encounters of the Hacker Kind: A Story from the Front Line
Dec 20, 2002
63.
SQL Server Attacks: Hacking, Cracking, and Protection Techniques
Nov 29, 2002
64.
Buy Microsoft, Go to Jail?
Nov 15, 2002
65.
Warez All that Pirated Software Coming From?
Nov 1, 2002
66.
The Ingredients to ARP Poison
Oct 18, 2002
67.
Going on the Defensive: Intrusion-Detection Systems
Oct 4, 2002
68.
Securing Information Internet Server
Sep 13, 2002
69.
Windows XP Wireless Security
Aug 16, 2002
70.
Windows XP Remote Assistance
Aug 9, 2002
71.
The Internet Connection Firewall in Windows XP
Aug 2, 2002
72.
Cracking WEP
Jul 12, 2002
73.
Raw Sockets Revisited: What Happened to the End of the Internet?
Jun 21, 2002

RSS Feed   Subscribe     RSS details

Using Fake GPS Coordinates to Spoof Facebook Places
Aug 20, 2010 Comments
Topics: Security, Information Technology
Getting Owned for Fun and Experience
Oct 6, 2008 Comments
Topics: Security, Information Technology, Certification
Political Hack Jobs - Literally...
Sep 20, 2008 Comments
Topics: Security, Information Technology
Get Your Hack On - The Value of Cyber Excercises
Sep 8, 2008 Comments
Topics: Security, Information Technology, Certification
Cloud AV vs. Malware
Aug 11, 2008 Comments
Topics: Software Security, Security, Network Security
Mobile Malware - The Facts
Aug 1, 2008 Comments
Topics: Software Security, Security, Network Security
Kaminsky DNS Forgery Attack Public - PATCH NOW!
Jul 21, 2008 Comments
Topics: Security, Operating Systems, Server, Networking, Information Technology
Confessions of IT Staffer - Spying On Management
Jul 8, 2008 Comments
Topics: Security, Information Technology, Business & Management
Firefox 3 - Still possible to steal user credentials....
Jun 19, 2008 Comments
Topics: Web Development, Security
The Eye-Fi LoJack
Jun 9, 2008 Comments
Topics: Security
WarGames - Redux
Jun 3, 2008 Comments
Topics: Software Security, Security, Networking, Network Security
Fired for 'whistle blowing' on security issues - right or wrong?
May 26, 2008 Comments
Topics: Security, Networking, Information Technology
MI5 vs. Security Researcher
Apr 18, 2008 Comments
Topics: Security
The Comcast Paranioa
Apr 16, 2008 Comments
Topics: Security, Information Technology
Hacker Swag for Charity
Apr 15, 2008 Comments
Topics: Security, Operating Systems, Server, Open Source, Networking, Information Technology
Winamp Remote
Mar 19, 2008 Comments
Topics: Web Development, Security, Networking, Home & Office Computing
The price of a successful security plan
Mar 17, 2008 Comments
Topics: Security, Information Technology
RFID Vulnerability Affects One Billion Users
Mar 13, 2008 Comments
Topics: Wireless/High Speed/Optical, Software Security, Security, Networking, Network Security
All Your Hearts Are Belong To Us
Mar 12, 2008 Comments
Topics: Software Security, Security, Network Security
CCDC3 - Skewling college students on getting pwned
Mar 10, 2008 Comments
Topics: Security, Computer Science
Can you remain anonymous for a day? How about a week?
Feb 15, 2008 Comments
Topics: Security
Can you be forced to hand over your password if the encrypted data incriminates you?
Jan 28, 2008 Comments
Topics: Security
BSA's Naughty List: Adobe and MS users beware!!!
Jan 10, 2008 Comments
Topics: Software Development & Management, Other Applications, Operating Systems, Server, Open Source, Microsoft Windows Vista & Home Server, Microsoft Servers, Microsoft Applications, MAC OS X/Other, Linux/UNIX/Open Source, Home & Office Computing, Business & Management
How can you get Digg'd to the top? Buy votes!
Jan 4, 2008 Comments
Apple Brigade Is At IT Again
Dec 22, 2007 Comments
The Internet Gets Punk'd Again! Kid disciplined for using Firefox story is not true...
Dec 17, 2007 Comments
Topics: Software Security, Security, Network Security
Windows XP Network Recovery
Dec 16, 2007 Comments
The Symantec Virus That Eats Computers
Dec 7, 2007 Comments
Topics: Software Security, Security, Network Security
I Sold My First Vulnerability/Exploit
Dec 5, 2007 Comments
Topics: Software Security, Security, Network Security
Security Professional / CTO / Musician
Dec 3, 2007 Comments
Topics: Software Security, Security, Network Security
CIA agents use iPhones - because the bad guys don't know how to use them.
Nov 13, 2007 Comments
Topics: Security, Operating Systems, Server, MAC OS X/Other, Home & Office Computing
Hushmail Rolls Over for Feds
Nov 8, 2007 Comments
Forensically Invisible Images of Hot Chicks
Oct 17, 2007 Comments
Topics: Security
Anarchist Cookbook = Jail Time
Oct 8, 2007 Comments
They call it 'natural selection' - I call it fuzzing.
Oct 6, 2007 Comments
How to write insecure code
Oct 2, 2007 Comments
Snake Oil Salesmen vs. Your Sensitive Data
Sep 21, 2007 Comments
XSIO - Cross-site Image Overlay: A discussion and examples
Sep 11, 2007 Comments
EC-Council Ethical Hacking Practice Test
Aug 29, 2007 Comments
Topics: Security
Full-Disclosure Wins Again
Aug 15, 2007 Comments
Topics: Software Security, Security
Hacking CVS - House Wife Style
Aug 13, 2007 Comments
Topics: Security
Seth Fogie

Seth Fogie