Ransomware Decryption Service

Our article this week will focus on a project created to help businesses and individuals alike unlock their devices after a ransomware attack. The project, named “No More Ransom!” is a collaboration between National High Tech Crime Unit of Netherlands’ police, the European Crime Centre, Kaspersky and McAfee, and is designed to provide a way[…]

Biostar 2: Biometric Data Exposed

Biostar 2 is a web-based access control and time/attendance management system that is used worldwide by a number of large organisations to secure and centrally manage access to commercial buildings via the use of biometrics (i.e. Fingerprint and Face Recognition). The recently discovered security flaw has unveiled a large store of unsecured biometric data, credentials[…]

WhatsApp Fraud

Over the past couple of months, a newly created tool has been developed and used by malicious actors to exploit a recently discovered WhatsApp vulnerability. Successful exploitation of this vulnerability allows the malicious actor to manipulate quotes and images WhatsApp to say whatever they desire and even attribute them to a completely different user. This[…]

Protecting your digital footprint

Your digital footprint is becoming significantly more prevalent in recent years. With a combination of Facebook, LinkedIn, Instagram, forums and more, it is now easier than ever to build a portfolio of an individual. Your information is used to register for every online service imaginable. This information, while valuable, can be reasonably intrusive depending on[…]

Social Engineering pt. 1

Social Engineering is a term used to describe the process of socially manipulating someone into providing information or access to a variety of physical and digital assets. There are a variety of techniques that can be leveraged to be able to successfully perform social engineering. This article is broken into two parts, with the first[…]