The Real Infowars – Data Chop Shops and the Information Black Market

Hello. This is the Department of Justice… A bot from an unknown number Commerce has forever run-on information: from ascertaining market segments, calculating demand, dealing with invoices, or remembering whether your regular customers prefer shaken or stirred. Modern business has taken the use of information in day-to-day activities and multiplied it a thousand-fold, to the …

Crypto Security and Hacking

Intro In this blog I will try to inform everyone current issues involving cryptocurrencies while offering some advice in the end to help address this. This is not nearly enough for those interested in crypto but it is a start. 🙂 The Fake Amazon Token Crypto may seem easy to get into with big names …

How a bug allowed users to turn $1800 to $196,000

On the early morning of January 24, 2022, the popular non-fungible token (or NFT) marketplace “OpenSea” was subject to the theft of over 1 million USD worth of NFTs[1]. Users of the platform were able to strategically exploit a design flaw within the website, which allowed them to purchase expensive NFTs for significantly lower than …

YOU(R COMPUTER) DIED: Dark Souls 3, RCE, and CVD

Dark Souls 3 is the third installment of the massively popular Souls franchise of games developed by FromSoftware and published by Bandai Namco Entertainment. On January 22nd, 2022, it was made public that a flaw in Dark Souls 3‘s online PvP feature could expose players of the PC edition of the game to one of …

Apple, we have standards for a reason…

So Apple, one of the largest corporations in the world, leaders in technology, full of some of the smartest people ever born, have been building software for decades. Obviously Apple knows about modern security protocols and Policies in their field, using them adequately whenever needed… right? This was a bug discovered at the end of …

A fast yet effortless way to get scammed

In case you feel that you have been playing it quite safe, and want to spice up your Monday evening by having some information taken from you, consider looking into different QR codes you find online!  All jokes aside, Quick Response (QR) codes are square-looking barcodes that are easily machine-readable, which makes them very useful …

Zoom University – A Plea For Open Source

Since the beginning of the pandemic, everyone with access to the internet has probably become increasingly aware of a desktop (and mobile) application named zoom. No matter who you are, with everything moving to work from home, you’ve probably experienced it in one way or another, or at least a service very similar. Despite it’s …

Being a Good Defender is also Being a Good Attacker

https://www.sdxcentral.com/wp-content/uploads/2021/08/Cisco-Looks-to-Tie-ThousandEyes-Into-WAN-on-Demand-Strategy.jpg In order to defend your system against cyber-attacks, you must also be knowledgeable in methods of attacking that system. Although the realization came at a later time, Cisco was able to discover a potential method of attack against their Redundancy Configuration Manager for their StarOS system during security testing. Thankfully, no one had exploited …

Click Here for “Free Money”

All of us have probably seen some sort of ad similar to this on the web and most of us are able to tell that it false. Like the old saying goes “if it is too good to be true it probably isn’t true.” However, scams have been getting more and more convincing the recent …

The Application Mandate That Could Have Serious Security Consequences

At the low chance that you were considering attending the Beijing 2022 Olympics, you may want to reconsider. The reason: MY2022. What is MY2022? MY2022 is a smartphone application that is mandatory to use for all attendees of the Beijing 2022 Olympics, including press members, government agents, and athletes. While there currently does not exist …