Subnetting IPv4 – TL;DR
Estimated difficulty: 💜💜💜🤍🤍
Every time I attend a course and someone tries to explain subnetting to me, they pretty much un-teach me it and I have to go away and re-learn how it works.
Estimated difficulty: 💜💜💜🤍🤍
Every time I attend a course and someone tries to explain subnetting to me, they pretty much un-teach me it and I have to go away and re-learn how it works.
Estimated difficulty: 💜💜💜🤍🤍 This week I wanted to write the first post of a mini mobile application reverse engineering series! There has been a lot of attention in the news about apps such as TikTok and the COVID-19 NHS track and trace app, where they have been shown to have certain security flaws. By writing …
Estimated difficulty: 💜🤍🤍🤍🤍 Ransomware can be a costly attack to organisations of all sizes. Recently Garmin fell victim to a ransomware attack, with reported ransoms of up to US$10 million in exchange to reinstate company files. According to a The State of Ransomware 2020 by Sophos, the global average cost to remediate a ransomware attack …
Estimated difficulty: 💚💚💚 Hey Securiteenies! This week we’re covering a few common numerical systems in the technology world – mostly because they’re really cool, but also because you might come across these in the wild sometime and it’s useful to know how they work and understand what they mean. We’ve tried to keep this post …
Estimated difficulty: 💚💚💚 Welcome to my first blog post for Securiteenies! We’ve created a difficulty rating based on a 3 heart system. Since the summer holidays have kicked off, we’d like to help you learn some fun skills over your lock-down break. This post was inspired by a question asking us how to install and …
Estimated difficulty: 💜💜💜🤍🤍
Chances are, if you study or work in Information Technology, or specifically the realm of Information Security, you’ve heard of security management. Security management, though broad, is pretty nuanced and encompasses every domain of security in one way or another – this post will cover at a high level what some areas of security management are, (we’ll look at these in more individual detail in later posts) and briefly what some of the problems are that organisations face with security management.
Estimated difficulty: 💜💜💜💜💜 For the folks that follow me on Twitter, you may remember me exclaiming for help a few months back for information on the security within the aviation industry for my Information Assurance (IA) assignment. Firstly, a huge thank you to everyone that reached out – applying professional knowledge to my research resulted …
Read more “Grounded: A High-level Overview on Aviation Industry Security”
Estimated difficulty: 💜💜💜🤍🤍 In light of recent worries around 5G and its effects on the population (in particular the theory of it causing COVID-19), I thought I would try to demystify the cellular network generations and provide an understanding of how they have developed; in particular, focusing on the security and networking side of things. …
Read more “How Does Your Mobile Communicate? The Generation Time Warp!”
Estimated difficulty: 💜💜🤍🤍🤍 Authentication. A familiar “buzzword” we see that is parroted in all things security, a selling point for many vendors, and a well-known term written (quite a lot) by pen-testers in their final reports. But what exactly is authentication? Well, in reality authentication is a complex and sizeable topic, but to get you …
Estimated difficulty: 💜🤍🤍🤍🤍
Content Warning: This post includes discussion of sensitive topics such as revenge porn and blackmail. This week I’m primarily going to cover sextortion phishing campaigns, and a little about how to deal with these sorts of emails. I’ll also include some resources at the end of the post discussing general (non-phishing) sextortion, and organisations who can help if somebody tries to blackmail you with, or releases your personal content without your consent.