I’m no Steve Wozniak but I carry a healthy distrust of computers. After hearing of the Equifax data breach affecting the privacy of more than 145 million Americans, learning Uber paid and tried to cover up the loss of 57 million driver and passenger records and seeing the lasting impact of the Meltdown attack I’m starting to understand the gravity this quote from Woz:
You unbox your new toy only to realize you can’t connect it because the cafe you’re sitting at is using a captive portal.
Gah! What to do… Shell into the device and use
You reach into your Tortuga carry-on bag, pull out your laptop and do the only sensible thing you can think of—spoof the device’s MAC address.
Here’s how to spoof the MAC address of an IoT device using macOS.
Recently while Googling
Olla de Carne (Costa Rican beef stew) my browser was hijacked after taking a search results link. Rather than receiving a list of ingredients, the link redirected the browser to a bogus antivirus site that mimicked Windows and faked an integrated Explorer virus scan. Let’s examine how it happened.