Brian's Science and Technology
1.1K views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Brian Haddock
Scoop.it!

Interesting geographic attack vector from a Russian launched cyber counter-attack

Interesting geographic attack vector from a Russian launched cyber counter-attack | Brian's Science and Technology | Scoop.it
I love the Russians. I know, strange to hear that from an American in modern day with a new “cold war” (seemingly) beginning to gain steam. Let’s say, I respect them. Their hackers in particular. Their response to a cyberattack is to launch a full-on offensive attack against the attacker, quite a different response from the Chinese who tend to just block attackers, or the Americans, who never even notice an attack is taking place. http://geekslop.com/2015/geographic-attack-vector-from-russian-cyber-counter-attack
more...
No comment yet.
Scooped by Brian Haddock
Scoop.it!

Interesting list of Chinese filtered words, banned domains, and potential username/passwords

Interesting list of Chinese filtered words, banned domains, and potential username/passwords | Brian's Science and Technology | Scoop.it
That China filters their Internet traffic is no secret – their societal system (many believe) requires that information be filtered. What is more interesting, are the *words* that are filtered. Several research groups have studied China’s walled-off Internet infrastructure (via search engine results, reverse engineered software and hardware products, leaked router or firewall settings, etc.) and compiled lists of words and phrases that are banned or filtered inside China. Here is a large sample of their findings. http://geekslop.com/2014/list-of-chinese-filtered-words-china-banned-domains-potential-common-username-passwords
more...
No comment yet.
Scooped by Brian Haddock
Scoop.it!

How to secure your Internet connection using a secure VPN through a secure VPN

How to secure your Internet connection using a secure VPN through a secure VPN | Brian's Science and Technology | Scoop.it
If you are suspicious of Tor, tired of the laggy connection, or simply want a more stable means to ensure your connection is encrypted and secure, you can easily create a VPN connection through a VPN connection which ensures anonymity and hard-core encryption of your network stream (with kill switches to protect your identity if the VPN connection is dropped). http://geekslop.com/2014/how-to-secure-internet-connection-using-secure-vpn-through-secure-tunneled-vpn
more...
No comment yet.
Scooped by Brian Haddock
Scoop.it!

Heartbleed OpenSSL (SSL/TLS) vulnerability - analysis of a mind-blowingly simple bug

Heartbleed OpenSSL (SSL/TLS) vulnerability - analysis of a mind-blowingly simple bug | Brian's Science and Technology | Scoop.it
The OpenSSL encryption flaw, known as the Heartbleed bug, is being called one of the biggest security flaws ever seen on the Internet. One security analyst called it “catastrophic” and said that on a scale of 1 to 10, the vulnerability was an 11. The newly discovered vulnerability isn’t “big news” because of its complexity, but for the fact that the amazingly simple bug existed for two years before anyone noticed allowing millions of servers to remain vulnerable and open to hacker attacks. http://geekslop.com/2014/heartbleed-openssl-ssl-tls-vulnerability-hacker-bug-analysis
more...
No comment yet.
Scooped by Brian Haddock
Scoop.it!

14 days running a secret Dark Web pedophile honeypot (and why I now think Tor is the devil)

14 days running a secret Dark Web pedophile honeypot (and why I now think Tor is the devil) | Brian's Science and Technology | Scoop.it
Before discoursing the lengthy analysis of the Dark Web honeypot (the pedophile honeypot in particular), let’s answer the question that is surely on everyone’s mind – did the honeypot allow me to reveal the true identity of the person visiting the site? http://geekslop.com/2015/catching-pedophiles-running-secret-dark-web-tor-honeypot
more...
No comment yet.
Scooped by Brian Haddock
Scoop.it!

Shellshock vulnerability - critical security vulnerability discovered in Bash (Bourne-Again Shell)

Shellshock vulnerability - critical security vulnerability discovered in Bash (Bourne-Again Shell) | Brian's Science and Technology | Scoop.it
If your Linux/Unix (or Apple Mac OS X) applications are running with root permissions and call on the shell, this vulnerability (called “Bash Bug” or “$hellshock”) is huge as it allows an attacker to remotely execute shell commands by attaching malicious code into environment variables used by the OS. The flaw is present in GNU Bash versions 1.14 through 4.3 (yup, this bug’s been around for 22 years now). Basically the flaw allows the attacker to create environment variables that contain trailing code – and the code gets executed as soon as the bash shell is invoked. And yes, it’s exploitable over the network. http://geekslop.com/2014/shellshock-vulnerability-critical-security-vulnerability-discovered-bash-bourne-shell
more...
No comment yet.
Scooped by Brian Haddock
Scoop.it!

Winds of change - Britain toughens up hacking laws - life sentences for some cybercrimes

Winds of change - Britain toughens up hacking laws - life sentences for some cybercrimes | Brian's Science and Technology | Scoop.it
The UK government has said it wants to hand out life sentences to anyone found guilty of a cyberattack that results in loss of life, serious illness, serious injury, or serious damage to national security (or a “significant risk thereof”. The plan, which frighteningly, is broadly written, is proposed as an update to Britain’s Computer Misuse Act 1990 and would also hand out harsher sentences to any hacker carrying out industrial (commercial) espionage. Even minor hacking crimes can result in sentences up to 14 years. http://geekslop.com/2014/winds-change-britain-toughens-hacking-laws-life-sentences-cybercrimes
more...
No comment yet.