Skip to main content

Contact

Your opinion matters. Let us hear about them. Rest assured we will read your message and do our best to respond.


Popular Posts

Attack Example - ClickJacking+Spoofing - UI Redress - Trusted User Interface

ClickJacking and Spoofing Attack Example - Trusted User Interface attack. It used to be that the most common operating system and browser being targeted for this kind of attack is Windows and IE. The underlying reason was that Windows has more users and Internet Explorer was basically File Explorer having a different user interface. Today, the attack surface is wider and much more complicated to notice. The screenshot posted here is a combination of a User Interface (UI) spoofing from a ClickJack.

Cryptocurrency 101 - Understanding the Terminologies & Underlying Technology - Part I

Initial Coin Offerings are for the most part, scams. Bitcoin is at its all time high despite the correction . And scammers who rely on the technical nature of cryptocurrency are very much borrowing the financial market's terminologies and intimidating decent and hard-working people to "invest" into it while they can afford it. There will be technical terms in this post and I'll try to use analogies that'll make them easier to understand. So, technical and semi-technical friends, do not chime-in correcting the analogies, we can do that over coffee or beer if you prefer - your treat if we do. Readers, the analogies is meant to be simple not because I think you will not be able to understand the technical aspects of it. I simply didn't see enough post using simple and real world analogies with all the buzz going around about cryptocurrency. Cryptocurrency - it is a "currency" based on a crypto. Crypto means secret or hidden. Currency is a ...