High Tech Drone Hijacked by Iran
A US High Tech Drone, RQ-170 Sentinel was highjacked by Iran. They did it via GPS spoofing. They jam the GPS signal, and create spoofed signal. After which, they landed it safety in Iran. Again, this...
View ArticlePassword Joke
Happy Boxing Day. Here’s a joke on password security from xkcd – Contributed by Jun Hao Tan
View ArticleFacebook to give out Whitehat Visa Debit Card to theirs bug bounty hunter
Facebook had previously launched their own bug bounty program, rewarding those who report bug while giving sufficient time for Facebook to correct before disclosure. Now, Facebook is further enhancing...
View ArticleJapan working on a Virus to Counter Cyber Attack
Some say “The best offence is the best defence” Japan is currently working on a computer virus capable of tracing source of cyber attack, identifying it and finally disabling it. This project has been...
View ArticleNSA release SE (Security Enhanced) Android
The National Security Agency from US had released it’s first version of Security Enhanced Android. It aims to address gaps in the security of Android. It uses various technique such as...
View ArticleSelf-extracting archive (SFX) as Virus Handler
You can also read the article on the video over here. – Contributed by Jun Hao Tan
View ArticleZappos breached. Millions of personal details at risk
Zappos.com, an online shoe and apparel outlet and Amazon subsidiary was compromised. Up to 24 millions customer personal details may be compromised. These details includes Names Email addresses Phone...
View ArticleThe Megaupload Saga
Megaupload, one of the biggest file hosting service website and responsible for 4% of all internet, was taken down in a coordinated blitz by US Justice Department. It was alleged for operating as a...
View ArticleIntroduction to Honeypots
On Friday 21st September, we have Emil – Team Lead and Co-Founder of Edgis, and Member of the Singapore Honeynet Chapter – to give an introductory sharing session on honeypot. The sharing session was...
View ArticleToday the Lights, Tomorrow, The World.
The Internet of things [1] is defined as everyday objects being interconnected and networked. This includes smart-devices such as phones, to appliances like refrigerators that orders groceries online...
View ArticleAntennas, Gain and Security
One of the common misconceptions that people tend to have is that higher gain = better. This results in people blindly buying the highest dBi rating omnidirectional antennas they can get their hands...
View ArticleWireless Channel Hopping
Ever wondered how your devices like your laptop get the list of wireless networks available? First of all, you have to understand that at any point of time, a wireless card can only listen to one...
View Article802.11 network security – Tools of the trade
I thought why not shed some light on the tools that I have been using to play with the WiFi networks around me. Hopefully, we can get gather a collective discussion on what works and what do not and...
View ArticleWi-Fi–Hacking Neighbor From Hell Sentenced to 18 Years – Please do not be one...
A Minnesota hacker prosecutors described as a “depraved criminal” was handed an 18-year prison term Tuesday for unleashing a vendetta of cyberterror that turned his neighbors’ lives into a living...
View ArticleNeed Privacy?
Sometimes I use Tor when I am hooked up to a Wi-Fi connection or a network which I am not familiar with. Simply because relying only on Wi-Fi encryption to keep your information safe is simply not good...
View ArticleFiresheep – The weakest link in security has been, and always will be, the...
I came across this Firesheep article while I reading Crypto-Gram published on 15th July 2011 and thought that this was really interesting. The point to highlight in this article here is not the...
View ArticleHow would you Classify an APT?
Govware 2011 – Enterprise Security Track I had the privilege to be in one of the sessions conducted by SecureAge in the Enterprise Security track today. What aroused my interest was actually their...
View ArticleCreating a WPA wordlist for cracking using JTR (John the Ripper)
John the Ripper is an extraordinary tool that is useful for cracking passwords. First we must understand that using a word list is one of the ways to crack a WPA protected router. Rainbow tables can...
View ArticleNetcat – The Swiss Army Knife of Networking
1. Introduction to Netcat Netcat is a network service for reading and writing network connections using either TCP or UDP. It has the ability to create almost any kind of network connections and has...
View Article