4 March 2018
The DPRK have been very busy in 2017, mining or stealing an estimated 11,000 bitcoins worth an estimated $200 million USD. There have been numerous reports of South Korean based BitCoin exchanges being hacked or compromised through social engineering attacks, aimed at infiltrating the seemingly secure network perimeters.
1 March 2018
VTech is multi-national company which develops and markets learning products for children from infancy to preschool, they also claim to be the world’s largest manufacturer of cordless phones. Within their catalogue of products there are several devices which use the Internet to connect their child’s educational toy to an educational portal which parents can use to interact with their child’s toy. In November of 2015, VTech published a press release in response to an incident involving a database which contained the personal information of their customers who utilized the Internet connected educational toys. This information (according to VTech’s press release) included name, email addresses, password (encrypted), secret questions and answers along with locational data such as IP addresses, mailing address.
27 February 2018
One of the biggest banes of Internet security are the dreaded default user accounts being left in place once a system is connected to the Internet. Device search engines such as the Shodan allow for security researchers and hackers alike to search for devices publishing specific information in a process called banner grabbing. The Shodan allows a user to search for all devices associated with a scanned IP address, and interrogate those services to determine what that system is doing online. Unfortunately for a school in Blackpool, Great Britain this also included their IP cameras installed within their campus.
27 February 2018
Recently an Australian Radio program (Hack) through the Australian Broadcasting Company reported on a user who was served with a copyright infringement whilst they were using a VPN. To better explain how this occured, I am going to explain how a VPN works, and then recommend some tips and alternatives to prevent this from happening to you too.
28 January 2018
Why are ethical hackers taught how to hack? If you are a vegetarian I will apologise in advance for this analogy, but every tool can be used as a weapon. The bread knife that you use to spread butter on your toast, can also be used to kill, maim, or even remove screws in the absence of a screwdriver. Much the same, tools intended for intrusion prevention can also be used to compromise, infiltrate and deface the same systems they were intended to protect. “To defend, you need to understand the attack.”
19 December 2017
Spam. It has been a bane of network administrators, users, and phishing targets for as long as most users today have been alive (if you were born after the mid 1970s that is)... So how does one track the sender of an email message, or the source of a spam message? Simple, we need to read the metadata within the email itself.
3 March 2018
Dash (formerly known as Darkcoin and XCoin) is an open source peer-to-peer cryptocurrency. On top of Bitcoin's feature set, it currently offers...
3 March 2018
Burstcoin (also called Burst) is a digital cryptocurrency and payment system based on the blockchain technology. Burstcoin was introduced on the...
3 March 2018
BlackCoin is a peer-to-peer cryptocurrency. BlackCoin uses a proof-of-stake system and is open-source. BlackCoin was created by the developer Rat4,...
3 March 2018
Bitconnect (BCC) is an open-source cryptocurrency which has been described as a high-yield investment program and as a Ponzi scheme.[3][4]...
18 February 2018
Passwords to access computer systems are usually stored, in some form, in a database in order for the system to perform password verification. To...
18 February 2018
Computer viruses are deadly. They often spread without any apparent contact and can be a nuisance, or even worse, fatal to your computer....