About a week ago, I saw this on VirusTotal: https://virustotal.com/en/url/4edb3a7d65360fb15dcdf411bb5cce35eba2b454cf9b6d7d7d5dd4d5dbfff7f9/analysis/ A user by the name of "sgsturby" reported that it was spam. I only had about 20 minutes free so I done some quick google searches involving the domain, which resulted in this: The domain is listed at untrustworthy with a category of Spam by … Continue reading A Small Spam Campaign
Over the past 10 years, connecting physical things to the internet has become quite a trend. People have been adding more and more devices to the internet, such as toasters, televisions, dog food dispensers, baby monitors and even wheelchairs. These devices provide very useful functionality in the average home, since you can change various environmental factors … Continue reading The IoT Revolution
Project PWD is a project that lasted about 1 week and it was mainly just focusing on me learning new ways to create interesting designs and backgrounds.
The general concept of ransomware is that the victim is forced into paying a ransom in order to gain access to their computer or virtual property.
Over the past 2 years, various companies have developed Anti-Ransomware technologies, designed to stop the vast amount of ransomware variants doing harm on a user's computer. These programs usually work by classifying applications based on behavioural analysis, system activity, disk activity as well as calling specific functions that encrypt data.
In early 2016 security researchers across the world noticed an increase in ransomware. In fact, it was an estimated 200-400% rise in the number of ransomware infections. Such ransomware families included TeslaCrypt, Cerber, Jigsaw and many others that were propagated in many different forms - Malvertising, File-Sharing and compromised websites. For a lot of 2016, … Continue reading My Summary of Cyber Security in 2016
This blog post describes my experiences. It may differ for you. When someone hears the phrase "Cyber-Security", they automatically think of either a hacker or some nerd in an underground lab. The problem is not the Cyber-Security community itself, it's education. In many schools across the UK, Information Security in primary schools, secondary schools and … Continue reading My Viewpoint on Cyber-Security in Education
Yep, the title explains it all. I'm putting my first Minecraft world up for download. This world was created in Minecraft 1.4.2 in 2012. It was then updated to MC 1.6 then 1.7.10 then 1.8.9. I stopped building in this world 2 years ago when I became interested in resource packs. The world is supposed … Continue reading Download my first Minecraft world
On Sunday 10th July 2016 at 03:00 GMT, Kaspersky Internet Security for Android detected 2 pieces of malware on my device within a pirated version of Minecraft Pocket Edition. (Yes I pirate games if I have to) 10 minutes later, the scan finished and KIS stated that it had found one malicious app running in … Continue reading How I dealt with the Ztorg Android Malware
I now see a lot more people using password managers and other people starting to generate random passwords for different services, but is storing passwords in a password manager a good idea? Password managers work by storing the users password in a heavily encrypted form on either the users PC or an internet service. Keep … Continue reading Password Managers and Storing Passwords