-
Ordinypt the ransomware targetting German Human Resources.
Ordinypt is a new ransomware in Germany . It appears as a ransomware but destroys data. It seems to be targetting only people in Germany because of its email delevering language only in German. The email arrives as a ”job advertisement submission” resume with 2 files attachments : – A JPG image of a woman submitting […]
-
WannaCry Malware Take Away
The world has experienced a Cyber Attack according to numerous open-source, classified as a ransomware campaign.It created ten of thousands of infections in Over 150 countries including the United States, United Kingdom,Spain, Russia, Taiwan,France and Japan. The software can run in as many as 27 different languages.The piece of code is affecting only Microsoft Windows […]
-
Basics of Digital forensics Procedure
The digital forensics is the acquisition of digital evidence from many sources such as Laptop, PC, digital cameras, mobile phones ,Routers… USB and SSD cards. The first step is to make a clear picture of the object. The pictures must contain elements such a serial numbers, damaged areas. Then unscrew the device to take the […]
-
Public key infrastructure (PKI)
A Public key infrastructure is a system that incorporates asymmetric encryption and certificate to provide security. There are two principals actors: The client and the certificate authority(CA). The Cryptographic Service Provider (CSP) on the client side generates the key pair. Once the key pair has been generated, the client will keep the private key and […]
-
Malware Information Sharing Platform-MISP
The Malware Information Sharing Platform is used to store ,share and collaborate on malware across organizations. The Indicators of Compromise (IoC) are used to detect and prevent Cyber attack. The MISP integrates many features :-Efficient Built-in database to store malwares, information on attackers and intelligence -Data are stored and shared in a structured format. -Data […]
-
A look at Verizon Data breach digest report
Verizon released its data breach digest report. It is a resume of 500 Cybersecurity investigations occurring in over 40 countries. All scenarios were drawn from real-world cyberinvestigation.It is a 84 pages document with 18 scenarios divided in 4 groups: The human element—five scenarios highlighting human threats or targets. Conduit devices—five scenarios covering device misuse or tampering. […]
-
Cybersecurity Awareness Month
We welcome this month October in the security community, as the cybersecurity awareness month. There will be different topics everyday for cybersecurity awareness activities. Phishing is the action of getting sensitive information from the victim without using force. Test yourself on how to recognise fake emails from legitimate ones by taking one of these test: […]
-
WIRELESS ENCRYPTION
Wireless networks are an easy way to connect our laptop, tablet or phone to the internet. Instead of using the traditional RJ45 cabling , the devices just needs to have a wireless card. There are three main types of encryption in wireless network: Wired Equivalent Privacy(WEP) which is available in 64-bit and 128-bit . It […]
-
Hackertainment
I found this collection of link to help in skills update. Either as a programmer, a game enthousiast or a hacker. Hackertainment provides more resources to use on our spear time. ToolsWatch has published the best security tools of the year 2014. My best security tool is Nmap. What is yours?.
-
HOME DEPOT BREACH
HOME DEPOT is a big box retailer in the USA. It suffered from a security breach that affected 56 millions payment cards. The malware used in the attack is most likely to have been used in others attack. Briankrebs who reported the attack suggests that the BlackPOS malware which was used againt TARGET was also […]