November 19, 2018: Some advises to keep you safe: If you did not request – don`t click on it! Never download and run any file you don`t 100% trust. Never enter sensitive information after following a link or popup.
November 18, 2018: Today I want to share my favorite part of Cybersecurity called Social engineering. I will give you some example that we can use inside of Social Engineering. Phising: the most successful attack. Vishing: phone. Smshing: messages. Spam: Unsolicited email. Doxing: Doxing is the process of retrieving, hacking and publishing other people’s information such as names, addresses, phone numbers and credit card details
November 17, 2018: Mobile os with security and privacy focus: Lineage os, Sailfish os, Replicant, Ommirom, Micro g and Pureos
November 15, 2018: Penetration testing and ethical hacking focused os: Kali Linux and Parrot Linux/GNU
November 8, 2018: Anonymity focused operating systems: Tail os and WHONIX
November 4, 2018: Pure security focused operating systems: Qubes os, Subgraph os, Trisquel gnu/linux, Hardened Gentoo linux, Pure os and Anstra linux
November 1, 2018: Today I learned that Windows is more secure than MAC and 81% of the computers in the world are running on Windows.
October 28, 2018: I am gonna demonstrate an example of Encryption using MD5. The example will be my name (Gabriel) encrypted into MD5: 60dafedc7d3fcd4ed227106717bbec78
October 25, 2018: Today I want to share some examples of malware attack.
Malware: macro virus, stealth virus, polymorphic virus, self-garbling virus, zombies or bots, worms, firmware root kit (the best one, it goes to your hardware)
October 23, 2018: What is a Cracker? A cracker is one who breaks into or otherwise violates the system integrity of remote machines with malicious intent
October 21, 2018: What is a hacker? A hacker is a person intensely interested in the arcane and recondite workings of any computer operating system
October 20, 2018: Privacy vs Anonymity
Privacy – Only you and your friend can have access
Anonymity – You send a message and everybody can see it but they don`t know who you are. Example: Tor
October 18, 2018: Today I started the Cybersecurity course and I saw something very important called Canary Tokens. Canary Tokens are hidden hacker traps.
October 17, 2018: I started learning some hacking tools in Kali Linux and the one that I liked the most was a Social Engineering attack. To be more specific the name of the method is Social Phishing. I hacked into a friend`s Facebook account (for academic reasons only) and it was a great experience.
October 16, 2018: Dr. Hatley created our project blog pages. This should be interesting.
0 Comments