Cybersecurity school to open at Bletchley Park

Categories cyberdefence, Education, international reports

Great news that a cybersecurity college is going to be set up at Bletchley Park to teach 16-19-year-olds cybersecurity skills along with maths, physics, computer science and economics. What better place for the college to be located than at Bletchley Park, the UK’s hub of codebreaking during the second world war?


Continue reading “Cybersecurity school to open at Bletchley Park”

“HOMEKit” the Exploit Generator Used to Deliver Espionage Malware

Categories cyberdefence, international reports, malware

The toolkit, dubbed “HOMEKit” by Palo Alto Networks, is believed to have been used to generate malicious Microsoft Word documents for various campaigns since 2013. Similar to the MNKit exploit generator, HOMEKit relies on the CVE-2012-0158 vulnerability in Office to deliver malware.

Continue reading ““HOMEKit” the Exploit Generator Used to Deliver Espionage Malware”

Transfer Stolen Data from Air-Gapped Computer by using HDD’s noise

Categories cyberdefence, hacking, international reports

According to the hackernews, a new way to stole data form air-gapped computer is found. Air-gapped computers that are isolated from the Internet and other computers are long considered to be the most secure and safest place for storing data in critical infrastructures such as industrial control systems, financial institutions, and classified military networks.

Continue reading “Transfer Stolen Data from Air-Gapped Computer by using HDD’s noise”

Blockchain technology- the new internet of value

Categories financial internet, international reports

Created by the mysterious hacker known as Satoshi Nakamoto, the blockchain—the distributed ledger technology that underlies the Bitcoin virtual currency—Blockchain has the potential to upend industries from finance to real estate to entertainment.

In the simplest terms, the blockchain transfers value from one party to another over the Internet. That could be money, a share of stock, a property deed, a digital royalty—even a vote cast in an election.

Continue reading “Blockchain technology- the new internet of value”

Visual Hacking and its success

Categories hacking, international reports

What is visual hacking? Spying what’s on others’ computer screens and desks.


3M’s 2016 Global Visual Hacking Experiment has found that the overwhelming majority of companies across the globe are not prepared to detect visual hacking in business office environments or to protect their most valuable information. To test the efficacy of visual hacking techniques, 3M had a white hat assume the role of a temporary office worker.

Continue reading “Visual Hacking and its success”

Gmail flags dangerous emails

Categories Google, international reports

Google this week added new alerts to Gmail to improve the security of its users by informing them when messages can’t be authenticated and when they contain dangerous URLs.


Gmail is now alerting users whenever they receive a message that can’t be authenticated with either Sender Policy Framework (SPF) or DKIM, Google announced. The alert comes in the form of a question mark in place of the sender’s profile photo, corporate logo, or avatar.

Continue reading “Gmail flags dangerous emails”

Linux flaw allows hijacking web connections

Categories international reports, Linux, Protocols

According to the (, researchers from the University of California, Riverside and the U.S. Army Research Laboratory discovered that a Transmission Control Protocol (TCP) specification implemented in Linux creates a vulnerability that can be exploited to terminate connections and conduct data injection attacks by  using an attack method that allows a blind, off-path attacker to intercept TCP-based connections between two hosts on the Internet.

Continue reading “Linux flaw allows hijacking web connections”

Yet another hack for Android

Categories international reports, smart devices

Android has Fallen! Yet another set of Android security vulnerabilities has been discovered in Qualcomm chipsets that affect more than 900 Million Android smartphones and tablets worldwide.

What’s even worse: Most of those affected Android devices will probably never be patched.
Dubbed “Quadrooter,” the set of four vulnerabilities discovered in devices running Android Marshmallow and earlier that ship with Qualcomm chip could allow an attacker to gain root-level access to any Qualcomm device.

Continue reading “Yet another hack for Android”

Guarding The Grid

Categories cyberdefence, international reports

Quietly and without much public recognition, the National Guard has been developing a sophisticated capability for cyberdefense.

A few weeks ago I was on Capitol Hill at an event sponsored by the Lexington Institute discussing the growing role of the National Guard in protecting the nation’s critical infrastructure from cyberattacks — specifically the electric power grid. Risks to US critical infrastructures are growing significantly; the Department of Homeland Security reported a seven-fold increase in cyber incidents on critical infrastructures between 2010 and 2015.

Continue reading “Guarding The Grid”