Interested in Infosec & Biohacking. Security Consultant. Love reading and running.
Stop Using FB & IG iOS App Now Unless You Want to Feed Zuckerberg.
Do you find the iOS Facebook app and Instagram app slow? Yes, it is because it does much more than what they display. Felix Krause, a former Google engineer who studies privacy, said in a blog post on the 10th that Facebook and Instagram apps track users’ browsing behavior on third-party websites without consent.
A Story With No Ending, MetaMask User Lost 41 ETH in A Hack
Crypto investor Jonny Reid shared his experience of stealing encrypted assets in his MetaMask wallet on Twitter. Learning from his review of the incident, he believes that he has a “high level of security awareness.”
CSMA is More Than XDR — Introduction to Cybersecurity Mesh Architecture
Not surprisingly, during recent meetings, customers often asked me how to manage all cybersecurity tools. According to the Gartner Top Security Technology Trends for 2022, I am not alone. It is top of the mind of many CISOs that a consolidated while distributed security architecture is essential to fight the cyberattacks’ perfect storm: multi-cloud and remote work security.
How to Harden K8S
My only impression of those spy movies is the scene when agents from NSA eavesdrop on communications outside the United States. But it is not the only job that the National Security Agency does. Apart from that, the NSA also contributes to the cybersecurity community.
Crypto Fraud New Trick: the Victim’s MetaMask Wallet Was Emptied
By tricking victims into resetting their Apple ID and obtaining a 2FA one-time verification code, the scammers could access their MetaMask-related data stored on iCloud and drain the funds. MetaMask also immediately called on users to turn off the iCloud backup function on Twitter.
Protect Your Crypto Wallets With InfoSec - The Three-Tier Wallet System and Crypto-Hygiene
"Crypto-heists" are all over the news. In March, Arthur_0x, the founder of DeFiance Capital, had many NFTs and cryptocurrencies in his wallet to be stolen by mistakenly hitting phishing documents.
PCI DSS 4.0 is Out! Here's What You Need to Know About the Updates
The PCI Standard Security Council (PCI SSC) recently published an update (31st March 2022) to the well-known PCI Data Security Standard (PCI DSS). The new version 4.0 brings significant changes to the payments ecosystem, which in short, places an increased focus on:
Ransomware Doesn't Arise in A Vacuum — Spotting the Early Sign of Ransomware Infection
Ransomware is among the fearest cyberattacks in the community, putting critical infrastructures at risk. Unfortunately, individuals and organizations continue to fall victim to this age-old cybercrime — and it's far from a new phenomenon. However, like a pandemic that doesn't start in a vacuum, so does Ransomware.
Developing Cyber Resilience: How To Think Like a Forensic Investigator
We all continue to have complete dependence on information technology deployed in critical infrastructures and applications in the public and private sectors. Yet, from the electric grid to voting systems to the vast "Internet of Things."
The Biggest Problems with WhatsApp's Privacy Practices
One of the features that win many people to WhatsApp compared to other instant messages is the end-to-end encryption, which is active even when using a multi-device. As a result, we can see more people have doubts about privacy in Facebook Messenger. (Although the author was asking users to switch to WhatsApp!)
Why Phishing is Still the Most Successful Hacking Technique
Most of us will not click on the email claiming we are lottery winners nowadays. However, phishing attacks have evolved and remained the most dangerous cyberattack for individuals or enterprises since the first phishing attack in 1995.