Shamir Secret Sharing

Walkthrough of the Teaching Aide: Shamir Secret Sharing  “Welcome! Today, we will dive into Shamir’s Secret Sharing”  Understanding cryptographic techniques is crucial for maintaining secure and reliable systems. Through this teaching aide, you will gain insights into Shamir’s Secret Sharing, a powerful method for dividing a secret into multiple parts (shares) that can only be …

Is your Mac OS free from malware?

Since November 2024 there has been an increase on Mac OS devices infected by the Banshee Stealer malware affecting many users and companies [1]. Apple invests a lot of resources on protecting their software and hardware, it is well known for XProtect, Notarization and Gatekeeper anti malware software that analyze the programs and the signatures …

Unveiling the hidden internet -teaching aide

Case study: Onion routing, the deep and dark web and the TOR browser The internet is an incredibly vast place, but what most of us see mainly is our social media feeds, search engines, and websites is just the surface. Beneath that lies a hidden world; the deep web and the dark web. Through this …

Cicada3301. The new trend in ransomware attacks

Can you imagine a situation where your data has been kidnaped by someone else? This is a very inconvenient position that a ransomware can bring to your computer or a whole company. Let’s analyze a new ransomware trend that seems to be very effective in multiple industries. What is ransomware? Let’s start by explaining what …

CrowdStrike Falcon EDR issue report

Airport delays, banks not working correctly, hospitals not able to provide services and many other daily services were affected due to the CrowdStrike Falcon EDR issue. But, what was the cause of this? And what can we learn from this incident? Let’s explore the issue report provided from CrowdStrike itself and make an analysis of …