Skip to main content

Vault 7 - CIA Hacking Arsenal

You may be wondering if we are keeping abreast with the issues about Internet Safety or not. We want to assure you that we are. Please stay tuned as we are reading as much as we can to be able to do a write-up about it.

- xxx -

Comments

Popular Posts

Attack Example - ClickJacking+Spoofing - UI Redress - Trusted User Interface

ClickJacking and Spoofing Attack Example - Trusted User Interface attack. It used to be that the most common operating system and browser being targeted for this kind of attack is Windows and IE. The underlying reason was that Windows has more users and Internet Explorer was basically File Explorer having a different user interface. Today, the attack surface is wider and much more complicated to notice. The screenshot posted here is a combination of a User Interface (UI) spoofing from a ClickJack.

Cryptocurrency 101 - Understanding the Terminologies & Underlying Technology - Part I

Initial Coin Offerings are for the most part, scams. Bitcoin is at its all time high despite the correction . And scammers who rely on the technical nature of cryptocurrency are very much borrowing the financial market's terminologies and intimidating decent and hard-working people to "invest" into it while they can afford it. There will be technical terms in this post and I'll try to use analogies that'll make them easier to understand. So, technical and semi-technical friends, do not chime-in correcting the analogies, we can do that over coffee or beer if you prefer - your treat if we do. Readers, the analogies is meant to be simple not because I think you will not be able to understand the technical aspects of it. I simply didn't see enough post using simple and real world analogies with all the buzz going around about cryptocurrency. Cryptocurrency - it is a "currency" based on a crypto. Crypto means secret or hidden. Currency is a ...