Hacking IoT Devices: How to Create a Botnet of Refrigerators
DDoS attacks that use botnets made of IoT devices are not just possible—they’re happening. You see threat lists and news articles that mention the Internet of Things (IoT) getting hacked…
Hacks, Data Breaches and Cybercrime—if it has to do with cyber security, we’ve got it covered here.
DDoS attacks that use botnets made of IoT devices are not just possible—they’re happening. You see threat lists and news articles that mention the Internet of Things (IoT) getting hacked…
Tips for Spotting Bogus Claims About Security and Encryption The snake oil salesman has always been around, peddling their bogus products. In the frontier days, they sold medical panaceas promising…
A Mistake Made By .io Registrar Highlights Problems With Vanity Domains Researcher Matthew Bryant was able to successfully take over the entire .io TLD after a slip-up by its operating…
Mozilla’s Observatory Tool Assess Website Security – And Many Fall Short. April King, a security engineer at Mozilla, found that the vast majority of the world’s largest sites – 93.45%…
The aggregation of voter data – which includes partial social security numbers – is a privacy concern. The full names, addresses, dates of birth, and political affiliation of 200 million…
Run Windows Powershell to Fix This Bug and Install Chrome. This was a rather perplexing bug I came across when trying to install Google Chrome on Windows: The full error…
The auction site selling Charlie Sheen’s ’27 Babe Ruth World Series ring is unsecure – tread carefully. The 1927 Yankees are considered one of, if not the greatest baseball team…
The Show’s Massive MiTM Attack Could Work – But These Security Measures Can Keep You Safe Minor Spoilers for Silicon Valley Season 4 Episode 9, “Hooli-Con.” This week’s Silicon Valley…
A group of Russian hackers has used Britney Spears’ Instagram account to come up with an ingenious malware scheme. The comments section of Britney Spears’ Instagram account was used by…
With Latest Settlement, the Cost of the 2013 Target Data Breach Nears $300 Million In 2013, a week before Christmas, Target suffered a now infamous data breach that resulted in…
5 Ways to Determine if a Website is Fake, Fraudulent, or a Scam – 2018
in Hashing Out Cyber SecurityHow to Fix ‘ERR_SSL_PROTOCOL_ERROR’ on Google Chrome
in Everything EncryptionRe-Hashed: How to Fix SSL Connection Errors on Android Phones
in Everything EncryptionCloud Security: 5 Serious Emerging Cloud Computing Threats to Avoid
in ssl certificatesThis is what happens when your SSL certificate expires
in Everything EncryptionRe-Hashed: Troubleshoot Firefox’s “Performing TLS Handshake” Message
in Hashing Out Cyber SecurityReport it Right: AMCA got hacked – Not Quest and LabCorp
in Hashing Out Cyber SecurityRe-Hashed: How to clear HSTS settings in Chrome and Firefox
in Everything EncryptionRe-Hashed: The Difference Between SHA-1, SHA-2 and SHA-256 Hash Algorithms
in Everything EncryptionThe Difference Between Root Certificates and Intermediate Certificates
in Everything EncryptionThe difference between Encryption, Hashing and Salting
in Everything EncryptionRe-Hashed: How To Disable Firefox Insecure Password Warnings
in Hashing Out Cyber SecurityCipher Suites: Ciphers, Algorithms and Negotiating Security Settings
in Everything EncryptionThe Ultimate Hacker Movies List for December 2020
in Hashing Out Cyber Security Monthly DigestAnatomy of a Scam: Work from home for Amazon
in Hashing Out Cyber SecurityThe Top 9 Cyber Security Threats That Will Ruin Your Day
in Hashing Out Cyber SecurityHow strong is 256-bit Encryption?
in Everything EncryptionRe-Hashed: How to Trust Manually Installed Root Certificates in iOS 10.3
in Everything EncryptionHow to View SSL Certificate Details in Chrome 56
in Industry LowdownPayPal Phishing Certificates Far More Prevalent Than Previously Thought
in Industry Lowdown