Scams are all over the internet. All of them socially engineer vulnerable people into believing them. Here is a list of how to spot some of the most common used on the internet! Websites that say "You have won the lottery" or something similar are almost always scams. There are rare cases where it just … Continue reading Scams, Phishing and Web Forgery.
UPDATE: The vulnerability isn't actually patched. The Session ID just doesn't get printed to the log files any more. On the 3rd March 2016, Mojang (The developers of Minecraft) released a new version of the Minecraft Launcher. Not much is known about what has changed between the old launcher version and the new launcher … Continue reading Yet Another Minecraft Vulnerability!
The '101' part of the title is unnecessary. I just added it, because why not? This blog post will just be a set of rules and guidelines for storing passwords and making sure that the users credentials are safe. The Password Entry Page Do not embed secure password pages on other insecure pages, this defeats … Continue reading Password Handling 101
Many people use adblock (Including me) and I noticed that a lot of businesses are stating that adblockers are bad and people should not use them. Don't listen to it. Adblockers provide an important role in security for blocking compromised adverts, malvertising, clickjacking and malicious web resources, which will infect users with all sorts of … Continue reading Adblock can be good for you
If you are wondering why I am re-writing this blog post, it is because the old version was terrible and didn't explain it very good. State-sponsored attacks / incidents are where government organizations target and attack certain companies such as Google or Facebook and try to steal personal information. This information often contains things which … Continue reading What are state-sponsored attacks?
Malware can spread in many different ways. This blog will explain most of the different methods and how they are used. The World Wide Web The World Wide Web is used in a number of ways to spread malware and infect vulnerable people. One of the most common techniques is to trick the user into … Continue reading The Methods of Spreading Malware
This post is just a bunch of ramblings. Feel free to leave if you dont want to be bored out of your mind 😉 This blog has been inactive for around a month or two and that was because I was burnt out from doing it. During that time, there were many things I wanted … Continue reading Ramblings
State-sponsored attacks are hacking incidents that are backed up or supported by government organisations/agencies. Often they support these attacks to gather information on the general public. These state-sponsored actors may target activists, anonymous members of the public and random members of the public. The actual information these state-sponspored actors will try to obtain are names, email … Continue reading [Old] What are state-sponsored attacks?
A few weeks ago there was a link released to the public that could crash Google Chrome. It looks like this: http://a/%%30%30 Note that this URL does not crash other browsers like IE, Edge or Firefox due to the way those browsers handle the URL. The Basics You cannot type certain characters into a URL, because … Continue reading The link that could crash Google Chrome!
A few people asked me to do this, so here it is! 🙂 Trojans Trojans are malicious software that are usually designed to steal confidential data from a victim. There are different types of trojan, each designed to perform a specific job. Usually they come with a keylogger to record every key pressed on a … Continue reading The Different Types of Malware