Meet our Team members: An Introduction to our Project : In today’s digital age, cryptography plays a vital role in securing communication, protecting sensitive data, and ensuring the integrity of information. However, as cryptographic techniques evolve, so too do the methods used by attackers to undermine them. This Teaching Aide will help you to understand …
Category Archives: Uncategorized
What is Spyware? Definition, types, how to find and remove spyware from your phone
“Trust not the horse, O Trojans. Be it what it may, I fear the Greeks when they offer gifts” _Virgil. Many of us have heard about the Greek mythology “Trojan horse” where a wooden horse was made for hiding soldier to enter the city of troy during war. No one thought that this small gesture …
Indigo Ransomware Attack A Comprehensive Ayalysis
OVERVIEW On 8th February 2023, Canada’s largest book retailer Indigo Books & Music Inc. suffered a ransomware incident that shut down its whole business. At store point of sale systems and e-commerce systems were infected and had to shut down and stop their entire systems to contain the spread of the attack. The Attacker was …
Continue reading “Indigo Ransomware Attack A Comprehensive Ayalysis”
Understanding RSA and its Vulnerabilities – Teaching Aide
Meet our team: Brief Introduction to the Project: Cryptography plays a key role in safeguarding our information and this is embedded in a lot of applications/devices we use today. This teaching aide will take you on a journey through understanding the fundamental concepts of the RSA cryptosystem, how authenticity is integrated, as well as potential …
Continue reading “Understanding RSA and its Vulnerabilities – Teaching Aide”
Lightweight Cryptography in IoT (Teaching Aide)
Group Project (1): ISEC 601 L02 -1 Firas ShamaJohn BroniKaushik MazumderMohammed IdrisuTamer Zeineldin Description The use of Internet of Things (IoT) devices in modern lifestyles introduces more security concerns that intersect with the need for modern cryptography. This research discusses how lightweight cryptography for IoT plays a significant role in securing these devices considering their …
Continue reading “Lightweight Cryptography in IoT (Teaching Aide)”
North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks
In the recent times hackers have been threat to organizations all over the world however these hackers claim to come from different regions and the North Korean hackers have been in news for the recent attack links to them which is known as undocument backdoor and remote access Trojan(RAT) called Veilshell. This is specifically built …
Continue reading “North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks”
E-Voting Teaching Aide
Hello fellow Applied Cryptography students! Cynthia, David, Maheen, Oscar, and I would like to introduce our teaching aide on e-voting to you! This interesting and cutting-edge application of cryptography will help you understand how the concepts we learned in class can solve fascinating problems in the real world. You will also get a glimpse of …
IS YOUR PHONE LISTENING?
Phones are a very core part of our everyday lives, but most people believe they are more secure than they actually are. Using SS7 I would like to prove to you that your phone may actually be listening to you. What is SS7 and how does it work? Signalling System No. 7 (SS7) is a …
Magento and Adobe Commerce Stores Are Victims of the CosmicSting Attack.
Introduction Cybersecurity researchers have discovered evidence of a large-scale attack targeting Adobe Commerce and Magento online retailers. Roughly 5% of these online marketplaces have been compromised by the so-called “CosmicSting” security holes. With a CVSS [Common Vulnerability Scoring System (CVSS) ] severity rating of 9.8, CVE-2024-34102 is one of the most serious vulnerabilities that have …
Continue reading “Magento and Adobe Commerce Stores Are Victims of the CosmicSting Attack.”
IoT and Security
The days of smart living is now! Its not in the past nor in the future, we are living smart! I can conveniently connect with devices with a sound of my voice, a tap of my finger or phone, a wave of my hand and so many interesting and easy ways! Isn’t that smooth?!… sure, …