The moment that COVID-19 took the world by storm, I knew that there would be an influx of malicious software that would be introduced to prey on the fears off the masses. One in particular caught my interest, “Corona Live 1.1” which is a supposed tracking software of the outbreak, but instead takes access ofContinue reading “Week 11”
Author Archives: commanderbb04
Week 7
Decided this week to post something that’s a bit closer to home. Upscale Minnesota grocery chain Lunds & Byerlys discovered that four of their stores were impacted with card skimmers. Card skimmers are nothing new- they’ve been around since I was in high school. What had me interested in this article was the fact thatContinue reading “Week 7”
Week 6
I often find myself scoping out the threat discoveries that Fortinet has managed to capture and this RAT, ViperSoftX, is a new JavaScript threat that was analyzed. Using 8 layers of code obfuscation, ViperSoftX uses AES decryption, converted Char arrays, and UTF8 decoding. The goal of the malware is to steal cryptocurrency. https://www.fortinet.com/blog/threat-research/vipersoftx-new-javascript-threat.html
Week 4
This article discusses a trojan that is present on an android phone app, and, in a rather morally abhorrent fashion, disguises itself as a diabetes help app. The app seems to function like as expected as a regular health app but, in the background, an old method of sending an SMS code to a trojanContinue reading “Week 4”
Week 3
With Brexit now officially started on its transition period, it leaves the question to be asked what will happen to the state of cybersecurity when the UK leaves the EU. This article explains how, surprisingly, it may make security more easily manageable without having to go through the hoops of permissions that EU standards upholds.Continue reading “Week 3”
Week 2
I know the article is dated by a year but I couldn’t help but find it highly amusing- mobile bitcoin mining apps that scam users. In the article it clearly states that mobile phones are unable to be bitcoin miners but, to the uninformed, it would seem like an easy means harvesting crytocurrency. The appsContinue reading “Week 2”
Week 1
To start the first week off, I decided to choose a a topic that perhaps isn’t trending news but doesn’t get the recognition it deserves- how easy it is to monitor Bluetooth devices using simple Kali Linux commands. This article comes from one of my favorite YouTube channels- Null Byte- which discusses hacking methods forContinue reading “Week 1”
My First Blog Post
Be yourself; Everyone else is already taken. — Oscar Wilde. This is the first post on my new blog. I’m just getting this new blog going, so stay tuned for more. Subscribe below to get notified when I post new updates.
Introduce Yourself (Example Post)
This is an example post, originally published as part of Blogging University. Enroll in one of our ten programs, and start your blog right. You’re going to publish a post today. Don’t worry about how your blog looks. Don’t worry if you haven’t given it a name yet, or you’re feeling overwhelmed. Just click theContinue reading “Introduce Yourself (Example Post)”