Tag: security

My SIM swap attack: How I almost lost $71K, and how to prevent it

On June 25th, I became a victim of SIM swapping, targeted along with dozens of other leaders in the blockchain community. This type of account takeover (ATO) fraud, also referred to as Port-Out scam, SIM

What Is Cyberwar? The Complete WIRED Guide

Not so long ago, stories about cyberwar started with scary hypotheticals: What if state-sponsored hackers were to launch widespread attacks that blacked out entire cities? Crippled banks and froze ATMs across a country? Shut down

Cryptography For Software Engineers

You pay by credit card in an unknown shop. How do you make sure your card is not copied? you type your password into google.com and press send how do you know no one else

A Decentralised Blockchain-Based VPN Network Could Be The Future of Private Communication

Broadly speaking, there are three parties fighting the guerilla war on privacy and internet anonymity. Government agencies, cybercriminals and we average internet users who mostly give Facebook all of our information and then complain, on

How Crypto Thieves Affect the Financial Security Crypto Should Avail

Crypto assets have slowly assumed the reputation of being the next poster boy for the financial industry. However, throughout its long and tedious ascent to global reckoning, cryptocurrency still continues to beg the question of

Privacy: What You Need To Know

Here is how it works. Researcher and social psychologist, Dr. Cazzell (Stanford, Queensland, BYU, Yale), excellently described this in her Behavioral Economics article with the Game of Clue. Here is how it works: When you

How Blockchain Could End Identity Theft on Dark Web

We feel that our personal data is very important and priceless. However, the reality is very different. Stolen credit card information, addresses, phone numbers, social security numbers are sold on the dark web for as

Understanding UFW

I have always been scared of IP tables. If you want to know the reason check out the man page for the same. Though I have heard from many people that IPtables are more robust

How Did Russian Hackers Phish America’s Power Grid?

The kill chain, the phishing attack and the broken trust graph The Wall Street Journal published an explosive story about how state-sponsored Russian hackers used a variety of techniques and a spider web of compromised accounts

Who’s Really Behind the World’s Most Popular Free VPNs?

After big names like Whatsapp, Snapchat, and Facebook, VPNs are the most searched-for applications in the world. “VPN” is the second-highest non-branded search term behind “games”, and free apps completely dominate the search results. The

Data Breaches: The Complete WIRED Guide

Another week, another massive new corporate security breach that exposes your personal data. Names, email addresses, passwords, Social Security numbers, dates of birth, credit card numbers, banking data, passport numbers, phone numbers, home addresses, driver’s

Cracking linux full disc encryption, luks with hashcat.

Luks (linux unified key system), and dm-crypt are the standard that linux, and many others use for doing whole disk encryption. When implemented correctly, it can be nearly impossible to brute force. However when using

What is 2-Factor Authentication and Why You Should Care

In the digital world that we live in, our virtual identity has become as important as the real one. We are becoming more and more aware of our virtual presence, social activity and how we

54% of Cryptocurrency Exchanges Have Security Holes

Exchange security report by ICORating.com Over the years, digital thieves have stolen millions of dollars’ worth of cryptocurrency from various exchanges. The crypto market attracts a huge number of investors and everyone hopes to get

Magecart 2.0: Architecture of a What-If

This case study was developed by Jscrambler’s Research team. During the past few weeks, we’ve been seeing an alarming number of attacks targeting several eCommerce and ticketing companies, stealing their clients’ credit card data. Behind these

Redirecting all variants of your domain to https Version

Assuming that I have a domain example.com I would like to redirect all the variations of this domain to the https version. There can be six variationsexample.com, www.example.com, http://example.com, http://www.example.com, https://example.com, https://www.example.com. I want to

Are Dating Apps Killing Romance?

Swipe, swipe, swipe, swipe… This sums up dating apps today. Endless swiping leading to a few matches, then less matches you decide to have a meaningful conversation with and eventually one or two people you

Malware Analysis using Osquery | Part 2

In the first part of this series, we saw how you can use Osquery to analyze and extract valuable information about malware’s behavior. In that post, we followed the activity of the known Emotet loader,

InfoSec Career Paths vs Programming Skills — The Basics

Image from https://www.2-sec.com/2017/08/day-life-2-sec-penetration-tester/ I’ve recently was asked for a numerous time?—?“Is being a great developer vital when choosing information security as a professional career?”, so I decided to write a more in-depth answer to the