365 days of blogs
New year, new beginnings and all that. This year I have set myself a challenge…
Securing the Post-Quantum Web: Chrome’s shift to Merkle Tree Certificates
The impending reality of quantum computing poses a significant threat to the cryptographic standards that…
USB – not all as it may seem
We all have one. It might be a box, an old carrier bag, or even…
AirSnitch – a MiTM attack for Wi-Fi
Most people who use a guest Wi-Fi network, such as the one in a hotel,…
SMS scammers sentenced
A British Transport Police (BTP) investigation has resulted in four men being sentenced to jail…
What is gopherware?
Gopherware (Gopher malware) is the term given to malware written in the Go (Golang) programming…
Net-NTLMv1 full rainbow tables released
Mandiant (the Google-owned Cyber Security research company) has released a comprehensive dataset of Net-NTLMv1 rainbow tables…
GhostPoster – A very unique browser exploit attack
Last December, security researchers at Koi Security revealed their initial findings into a novel browser…
Your headphones – a backdoor to your phone?
A couple of vulnerabilities were added to the CVE database last year that could have…
That Fax machine you’ve got – It’s letting hackers target you!
What fax machine? Nobody uses Fax machine anymore - do they? Well, outside of the…
Pixnapping attacks target Android devices
A new side-channel attack has been discovered that affects Android devices and could allow a…