This blog is inactive!

This is now an archive blog!

All of the new blog posts will be put over at

The reason I haven’t deleted this blog is so that the hyperlinks and references made to my blog in the past on social media and other places still work.



This post is just a bunch of ramblings. Feel free to leave if you dont want to be bored out of your mind 😉

This blog has been inactive for around a month or two and that was because I was burnt out from doing it. During that time, there were many things I wanted to blog about including the massive VTech hack or how Google is planning to deny all new SHA-1 Security Certificates in Google Chrome. I didnt have the time nor the energy and for that I’m sorry.

I recently posted something about state sponsored attacks, but to be honest I dont think I explained enough in that post. It needs more adding to it and I will probably rewrite that post sometime in the future.

As for later blogs, I have one planned for the 1st January 2016 and I hope that will be more interesting to the tech savvy people that read my blog posts.

Happy holidays! ❤

Extra: I really need better things to do than post ramblings 😛

[Old] What are state-sponsored attacks?

State-sponsored attacks are hacking incidents that are backed up or supported by government organisations/agencies. Often they support these attacks to gather information on the general public.

These state-sponsored actors may target activists, anonymous members of the public and random members of the public. The actual information these state-sponspored actors will try to obtain are names, email addresses, phone numbers, birthdays and other personal information used to identify you.

Government organisations can use this information to track and locate certain activists wanted by security agencies such as MI5, G4S or the police.

If your website/service comes under attack from a state-sponsored actor, it is almost impossible identify what government supported the attack. Some notorious governments known for these attacks are Russia, China, Great Britain and The United States.


If you do come under attack from a state-sponsored actor, it is recommended that you fix any vulnerabilities/security risks in your service as soon as possible to protect you and your users from government spying/hacking programs aiming to gain your personal information for illegal  uses.

Hacking is still illegal, even if they are in a position of authority / government power.

Music – Popularity

Recently I have been thinking a lot about music on radio stations and music in the UK Top40. Not because is like it, but because I am sceptical of it.

Popularity is a huge thing in the UK, and what I noticed about many people is that they only listen to music in the Top 40 and on radio stations because it is popular. They don’t care about whether it is good or not. It’s all about popularity.

The many reasons why I don’t like music in the UK Top40

  1. Most of them are talentless and use auto tune. Just look at this for example!
  2. They get repeated EVERY SINGLE LESSON at my school.
  3. I don’t particular like Future Bass / Deep House, which is in a lot of songs in the Top 40.
  4. Most of them are repetitive.
  5. Everyone thinks they are cool because they listen to it.
  6. They also think that because something has not got a lot of views, that it is rubbish.
  7. Most people only listen to it if it is mainstream or popular.

6 – Extra: I can think of many songs that are not in the Top 40 and are amazing! 😀


This was more of a rant than a blog, but on the good side, at least I am being open and honest about this

NOTE: Everything on this page is my opinion. I am entitled to my own opinion and you can’t force me to change that.

About this blog

This blog page will be used by me to talk about recent news and concerns in the security world.

If you dont know, I am a cyber-security researcher and enthusiast, and I decided that this place would be the best place for me to talk to the public about recent security issues.

By iFuzion77 – 16/08/2015