Windows 7 Exploitation

Microsoft Windows 7 is much more secure than Microsoft Windows XP. The Windows XP operating system has lots of OS vulnerabilities and the malware infection rate is also very high compared to other operating systems. According to the Microsoft Security Intelligence Report, which details in depth the state of software vulnerabilities, exploits, security breaches, and…

Analyzing Malicious PDFs

PDF files have become very common in everyday work. It’s hard to imagine business proposals without PDFs. The PDF format is used in almost all companies to share business deals, company brochures, and even invitations. Previous years were not good for PDF users, as several vulnerabilities were published, such as buffer overflow vulnerability in versions…

Hacktivism: Means and Motivations … What Else?

Introduction The term “hacktivism,” derived by combining hack and activism, refers to the use of computers and any other IT system and network to debate and sustain a political issue, promote free speech, and support human rights. Hacktivism is mainly interpreted by society as the transposition of the protest and the civil disobedience into cyberspace.…

Tunnelling SSH Traffic

Overview Security plays an important role in our internet world. As the number of users on the internet increases, it’s necessary to have secure communication between the sender and the receiver. Tunnelling is the method of protecting web traffic from our local machine in order to get privacy. Once traffic is tunnelled, no eavesdropper can…

SIM Card Forensics: An Introduction

The SIM (subscriber identity module) is a fundamental component of cellular phones. It also known as an integrated circuit card (ICC), which is a microcontroller-based access module. It is a physical entity and can be either a subscriber identity module (SIM) or a universal integrated circuit card (UICC). A SIM can be removed from a…

Làm an toàn thông tin thì học gì?

1 Giới thiệu Tôi nhận được thư từ của nhiều bạn hỏi về việc nên học gì và như thế nào để có thể tìm được việc làm và làm được việc trong ngành an toàn thông tin (information security). Tôi nghĩ việc đầu tiên bạn cần phải làm là in toàn bộ bài viết “Làm…