Understanding Cryptographic Attacks: Working, Prevention, Real-World Impacts, Strongest and Weakest Algorithm to Specific Attack – Teaching Aide

Meet our Team members: An Introduction to our Project : In today’s digital age, cryptography plays a vital role in securing communication, protecting sensitive data, and ensuring the integrity of information. However, as cryptographic techniques evolve, so too do the methods used by attackers to undermine them. This Teaching Aide will help you to understand …

What is Spyware? Definition, types, how to find and remove spyware from your phone

“Trust not the horse, O Trojans. Be it what it may, I fear the Greeks when they offer gifts” _Virgil. Many of us have heard about the Greek mythology “Trojan horse” where a wooden horse was made for hiding soldier to enter the city of troy during war. No one thought that this small gesture …

Indigo Ransomware Attack A Comprehensive Ayalysis

OVERVIEW On 8th February 2023, Canada’s largest book retailer Indigo Books & Music Inc. suffered a ransomware incident that shut down its whole business. At store point of sale systems and e-commerce systems were infected and had to shut down and stop their entire systems to contain the spread of the attack. The Attacker was …

Understanding RSA and its Vulnerabilities – Teaching Aide

Meet our team: Brief Introduction to the Project: Cryptography plays a key role in safeguarding our information and this is embedded in a lot of applications/devices we use today. This teaching aide will take you on a journey through understanding the fundamental concepts of the RSA cryptosystem, how authenticity is integrated, as well as potential …

Lightweight Cryptography in IoT (Teaching Aide)

Group Project (1): ISEC 601 L02 -1 Firas ShamaJohn BroniKaushik MazumderMohammed IdrisuTamer Zeineldin Description The use of Internet of Things (IoT) devices in modern lifestyles introduces more security concerns that intersect with the need for modern cryptography. This research discusses how lightweight cryptography for IoT plays a significant role in securing these devices considering their …

North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks

In the recent times hackers have been threat to organizations all over the world however these hackers claim to come from different regions and the North Korean hackers have been in news for the recent attack links to them which is known as undocument backdoor and remote access Trojan(RAT) called Veilshell. This is specifically built …

E-Voting Teaching Aide

Hello fellow Applied Cryptography students!  Cynthia, David, Maheen, Oscar, and I would like to introduce our teaching aide on e-voting to you! This interesting and cutting-edge application of cryptography will help you understand how the concepts we learned in class can solve fascinating problems in the real world. You will also get a glimpse of …

Magento and Adobe Commerce Stores Are Victims of the CosmicSting Attack.

Introduction Cybersecurity researchers have discovered evidence of a large-scale attack targeting Adobe Commerce and Magento online retailers. Roughly 5% of these online marketplaces have been compromised by the so-called “CosmicSting” security holes. With a CVSS [Common Vulnerability Scoring System (CVSS) ] severity rating of 9.8, CVE-2024-34102 is one of the most serious vulnerabilities that have …