Scams are all over the internet. All of them socially engineer vulnerable people into believing them. Here is a list of how to spot some of the most common used on the internet! Websites that say "You have won the lottery" or something similar are almost always scams. There are rare cases where it just … Continue reading Scams, Phishing and Web Forgery.
The '101' part of the title is unnecessary. I just added it, because why not? This blog post will just be a set of rules and guidelines for storing passwords and making sure that the users credentials are safe. The Password Entry Page Do not embed secure password pages on other insecure pages, this defeats … Continue reading Password Handling 101
If you are wondering why I am re-writing this blog post, it is because the old version was terrible and didn't explain it very good. State-sponsored attacks / incidents are where government organizations target and attack certain companies such as Google or Facebook and try to steal personal information. This information often contains things which … Continue reading What are state-sponsored attacks?
Malware can spread in many different ways. This blog will explain most of the different methods and how they are used. The World Wide Web The World Wide Web is used in a number of ways to spread malware and infect vulnerable people. One of the most common techniques is to trick the user into … Continue reading The Methods of Spreading Malware
This post is just a bunch of ramblings. Feel free to leave if you dont want to be bored out of your mind 😉 This blog has been inactive for around a month or two and that was because I was burnt out from doing it. During that time, there were many things I wanted … Continue reading Ramblings
State-sponsored attacks are hacking incidents that are backed up or supported by government organisations/agencies. Often they support these attacks to gather information on the general public. These state-sponsored actors may target activists, anonymous members of the public and random members of the public. The actual information these state-sponspored actors will try to obtain are names, email … Continue reading [Old] What are state-sponsored attacks?
A few weeks ago there was a link released to the public that could crash Google Chrome. It looks like this: http://a/%%30%30 Note that this URL does not crash other browsers like IE, Edge or Firefox due to the way those browsers handle the URL. The Basics You cannot type certain characters into a URL, because … Continue reading The link that could crash Google Chrome!
A few people asked me to do this, so here it is! 🙂 Trojans Trojans are malicious software that are usually designed to steal confidential data from a victim. There are different types of trojan, each designed to perform a specific job. Usually they come with a keylogger to record every key pressed on a … Continue reading The Different Types of Malware
Recently I have been thinking a lot about music on radio stations and music in the UK Top40. Not because is like it, but because I am sceptical of it. Popularity is a huge thing in the UK, and what I noticed about many people is that they only listen to music in the Top … Continue reading Music – Popularity
On the 11th of June 2014, this was released onto TweetDeck: https://twitter.com/derGeruhn/status/476764918763749376 It is a script tag containing JQuery, which when executed in the browser, would automatically retweet itself without the users knowledge. Usually, Tweetdeck would have a filter on for this to convert every < and > into < and > However, on the … Continue reading XSS and Twitter: The Self Retweeting Tweet