Walkthrough of the Teaching Aide: Shamir Secret Sharing “Welcome! Today, we will dive into Shamir’s Secret Sharing” Understanding cryptographic techniques is crucial for maintaining secure and reliable systems. Through this teaching aide, you will gain insights into Shamir’s Secret Sharing, a powerful method for dividing a secret into multiple parts (shares) that can only be …
Author Archives: Oscar ACM
Is your Mac OS free from malware?
Since November 2024 there has been an increase on Mac OS devices infected by the Banshee Stealer malware affecting many users and companies [1]. Apple invests a lot of resources on protecting their software and hardware, it is well known for XProtect, Notarization and Gatekeeper anti malware software that analyze the programs and the signatures …
Unveiling the hidden internet -teaching aide
Case study: Onion routing, the deep and dark web and the TOR browser The internet is an incredibly vast place, but what most of us see mainly is our social media feeds, search engines, and websites is just the surface. Beneath that lies a hidden world; the deep web and the dark web. Through this …
Continue reading “Unveiling the hidden internet -teaching aide”
Cicada3301. The new trend in ransomware attacks
Can you imagine a situation where your data has been kidnaped by someone else? This is a very inconvenient position that a ransomware can bring to your computer or a whole company. Let’s analyze a new ransomware trend that seems to be very effective in multiple industries. What is ransomware? Let’s start by explaining what …
Continue reading “Cicada3301. The new trend in ransomware attacks”
CrowdStrike Falcon EDR issue report
Airport delays, banks not working correctly, hospitals not able to provide services and many other daily services were affected due to the CrowdStrike Falcon EDR issue. But, what was the cause of this? And what can we learn from this incident? Let’s explore the issue report provided from CrowdStrike itself and make an analysis of …