On Sunday 10th July 2016 at 03:00 GMT, Kaspersky Internet Security for Android detected 2 pieces of malware on my device within a pirated version of Minecraft Pocket Edition. (Yes I pirate games if I have to) 10 minutes later, the scan finished and KIS stated that it had found one malicious app running in … Continue reading How I dealt with the Ztorg Android Malware
I now see a lot more people using password managers and other people starting to generate random passwords for different services, but is storing passwords in a password manager a good idea? Password managers work by storing the users password in a heavily encrypted form on either the users PC or an internet service. Keep … Continue reading Password Managers and Storing Passwords
Scams are all over the internet. All of them socially engineer vulnerable people into believing them. Here is a list of how to spot some of the most common used on the internet! Websites that say "You have won the lottery" or something similar are almost always scams. There are rare cases where it just … Continue reading Scams, Phishing and Web Forgery.
The '101' part of the title is unnecessary. I just added it, because why not? This blog post will just be a set of rules and guidelines for storing passwords and making sure that the users credentials are safe. The Password Entry Page Do not embed secure password pages on other insecure pages, this defeats … Continue reading Password Handling 101
If you are wondering why I am re-writing this blog post, it is because the old version was terrible and didn't explain it very good. State-sponsored attacks / incidents are where government organizations target and attack certain companies such as Google or Facebook and try to steal personal information. This information often contains things which … Continue reading What are state-sponsored attacks?
Malware can spread in many different ways. This blog will explain most of the different methods and how they are used. The World Wide Web The World Wide Web is used in a number of ways to spread malware and infect vulnerable people. One of the most common techniques is to trick the user into … Continue reading The Methods of Spreading Malware
This post is just a bunch of ramblings. Feel free to leave if you dont want to be bored out of your mind 😉 This blog has been inactive for around a month or two and that was because I was burnt out from doing it. During that time, there were many things I wanted … Continue reading Ramblings
State-sponsored attacks are hacking incidents that are backed up or supported by government organisations/agencies. Often they support these attacks to gather information on the general public. These state-sponsored actors may target activists, anonymous members of the public and random members of the public. The actual information these state-sponspored actors will try to obtain are names, email … Continue reading [Old] What are state-sponsored attacks?
A few weeks ago there was a link released to the public that could crash Google Chrome. It looks like this: http://a/%%30%30 Note that this URL does not crash other browsers like IE, Edge or Firefox due to the way those browsers handle the URL. The Basics You cannot type certain characters into a URL, because … Continue reading The link that could crash Google Chrome!
A few people asked me to do this, so here it is! 🙂 Trojans Trojans are malicious software that are usually designed to steal confidential data from a victim. There are different types of trojan, each designed to perform a specific job. Usually they come with a keylogger to record every key pressed on a … Continue reading The Different Types of Malware