By: The Rapture and fellow contributing Cybrarians Today’s Estimated Link Count: 1470 Updated 11/10/17 I will continue to keep this article up to date on a fairly regular basis. (update: I have been working a lot in the last year, and have so much I need
Read more →#spies Spies spying on spies? A recent article from the New York Times describes Israeli intelligence officers visibility into Kaspersky’s network in 2015 where they witnessed Russian government hackers hacking US government hackers. This may sound like the complicated plot of a Hollywood movie, but the story
Read more →#hacked It seems that word of new breaches have been released almost daily as of late. The latest, coming on the back on the devastating Equifax breach, is news that the Securities and Exchange Commission (SEC) was hacked last year. Gulp. The SEC is the top U.S. market’s regulator.
Read more →#wikileaks As expected, Wikileaks has added yet another leak to the Vault 7 collection, one that leaves Harry Potter fans speculating. This time, rather than being a hacking tool or surveillance method focused leak, this project focuses on a Missile Control System, complete with blueprints. ‘Project Protego’
Read more →Did someone share a Google Doc with you? If yes, you might be one of the millions of internet users who fell victim to this scam campaign. In the last few days, a lot of people received emails from their contacts with a seemingly normal and legitimate invitation
Read more →USBee – Q [aka Quartermaster] must have come up with this … It really does sound like something from a James Bond scenario – A standard USB device can become a transmitter without ever having to be removed from the system. By modulating the communication stream between
Read more →Rule #1. Remains anonymous – A vigilante always logs into anonymous accounts. Rule #2. Know the law – A vigilante knows the law and knows how to identify crimes that she/he would like to pursue. Rule #3.Collect data and file reports – When you meet a perpetrator
Read more →Introduction Botnets are computer botnets, which are programs connected to the Internet to communicate with other similar programs to perform certain tasks. An Internet bot is an automated or semiautomatic software agent that interacts with computer servers. A bot connects and interacts with the server as a
Read more →Abstract This report aims to shed light the major cyber security attacks that have hit Turkey’s infrastructure. It’s based on analyzing the vulnerabilities that opened the gateway for those attacks and how such an attacks could happen in the future if the appropriate security measures are not
Read more →