November 19, 2018: Some advises to keep you safe: If you did not request – don`t click on it! Never download and run any file you don`t 100% trust. Never enter sensitive information after following a link or popup.

November 18, 2018: Today I want to share my favorite part of Cybersecurity called Social engineering. I will give you some example that we can use inside of Social Engineering. Phising: the most successful attack. Vishing: phone. Smshing: messages. Spam: Unsolicited email. Doxing: Doxing is the process of retrieving, hacking and publishing other people’s information such as names, addresses, phone numbers and credit card details

November 17, 2018: Mobile os with security and privacy focus: Lineage os, Sailfish os, Replicant, Ommirom, Micro g and Pureos

November 15, 2018: Penetration testing and ethical hacking focused os: Kali Linux and Parrot Linux/GNU

November 8, 2018: Anonymity focused operating systems: Tail os and WHONIX

November 4, 2018: Pure security focused operating systems: Qubes os, Subgraph os, Trisquel gnu/linux, Hardened Gentoo linux, Pure os and Anstra linux

November 1, 2018: Today I learned that Windows is more secure than MAC and 81% of the computers in the world are running on Windows.

October 28, 2018: I am gonna demonstrate an example of Encryption using MD5. The example will be my name (Gabriel) encrypted into MD5:  60dafedc7d3fcd4ed227106717bbec78

October 25, 2018: Today I want to share some examples of malware attack.

Malware: macro virus, stealth virus, polymorphic virus, self-garbling virus, zombies or bots, worms, firmware root kit (the best one, it goes to your hardware)

October 23, 2018: What is a Cracker? A cracker is one who breaks into or otherwise violates the system integrity of remote machines with malicious intent

October 21, 2018: What is a hacker? A hacker is a person intensely interested in the arcane and recondite workings of any computer operating system

October 20, 2018: Privacy vs Anonymity

Privacy – Only you and your friend can have access

Anonymity – You send a message and everybody can see it but they don`t know who you are. Example: Tor

October 18, 2018: Today I started the Cybersecurity course and I saw something very important called Canary Tokens. Canary Tokens are hidden hacker traps.

October 17, 2018: I started learning some hacking tools in Kali Linux and the one that I liked the most was a Social Engineering attack. To be more specific the name of the method is Social Phishing. I hacked into a friend`s Facebook account (for academic reasons only) and it was a great experience.

October 16, 2018: Dr. Hatley created our project blog pages. This should be interesting.


Leave a Reply

Your email address will not be published. Required fields are marked *