Keeping your cryptocurrencies safe and secure.

Categories bitcoin, cyberdefence, fsocietygr, hacking

A false sense of security.

Last time we spoke about blockchain. It is true that cryptocurrencies can feel secure because they decentralize and often anonymize digital transactions.

cryptocurrencies

 

Let’s see what we can do to guard our selves against a swath of common attacks. Continue reading “Keeping your cryptocurrencies safe and secure.”

HTTPS protocol – Panacea to Websites Perfomance? Last Part

Categories Google, growth hacking, hacking, https, SEO

A little backstory

Back in 2014, HTTPS became a hot-topic after the Heartbleed bug became public. This bug allows people with ill intent to listen in on traffic being transferred over SSL/TLS. Therefore, it gave them the ability to hijack and/or read the data. Luckily, researchers patched this bug quickly after its discovery. This incident was a wake-up call that properly encrypting user information over the internet is a necessity.

Continue reading “HTTPS protocol – Panacea to Websites Perfomance? Last Part”

UK’s cybersecurity start-up accelerator program

Categories cyberdefence, hacking, international reports

Great news for cybersecurity

The UK government has announced an initiative that will see it join forces with some of the country’s hottest start-ups. They will fund the development of a start-up accelerator program that will help protect the UK from cyber attacks.

start-up accelerator program CESG Continue reading “UK’s cybersecurity start-up accelerator program”

Transfer Stolen Data from Air-Gapped Computer by using HDD’s noise

Categories cyberdefence, hacking, international reports

According to the hackernews, a new way to stole data form air-gapped computer was found. The technique got the name “DiskFiltration” and it is as interesting as it sounds. Air-gapped computers are compuers isolated from the Internet and other devices. Specialists considered for a long time thaty they are the most secure and safest place for storing data in critical infrastructures such as:

  • industrial control systems
  • financial institutions
  • classified military networks.

DiskFiltration

Continue reading “Transfer Stolen Data from Air-Gapped Computer by using HDD’s noise”

Visual Hacking and its success

Categories hacking, international reports

What is visual hacking? In essence, visual hacking is spying what’s on others’ computer screens and desks.

visual hacking

3M’s 2016 Global Visual Hacking Experiment has found that the overwhelming majority of companies across the globe are not prepared to detect visual hacking in business office environments or to protect their most valuable information. To test the efficacy of visual hacking techniques, 3M had a white hat assume the role of a temporary office worker.

Continue reading “Visual Hacking and its success”