Enter the Real World?

A Business VS an Advanced Persistent Threats APT

Cybersecurity is more critical in the digital era. Businesses are very dependent on technology and the power of the internet, and cyber-attack threats loom imminently. Protection against the revelation of sensitive information or intellectual property thus climbs to the forefront of many companies’ agendas worldwide. Meet Andrew: District Forensics and Incident Response Consultant Andrew is […]

Continue reading A Business VS an Advanced Persistent Threats APT

Red Rooms and their working on the dark web

Introduction To most, the dark web is an ominous place with images of the underworld and illegal acts. Among the very top in that list is the legend of Red Rooms. These are websites where, supposedly, pay-per-view viewers can watch live-streamed videos of murders, among other such acts of violence. But precisely what are Red […]

Continue reading Red Rooms and their working on the dark web

The ASUS Router Vulnerability: Close to something really bad

In 2013, Kyle Lovett, a senior penetration tester at Veracode, purchased an Asus router N66, highly popular among IT professionals for its impressive hardware. However, upon setting it up, he discovered several significant security flaws. The default username and password were set to ‘admin’ and users were not prompted to change them. The router also […]

Continue reading The ASUS Router Vulnerability: Close to something really bad

The Dark Reality of Red Rooms

Deep in the black underbelly of the internet, when the lights come down on legality and ethics, is a chilling legend that can even scare old-time web surfers: Red Rooms. It is rumored to be a place in the deep web where digital theaters stage horrible acts of violence and depravity in real time for […]

Continue reading The Dark Reality of Red Rooms

Chat on WhatsApp