Of Hacks & Keyloggers – Part 1

Of Hacks & Keyloggers…!!! “I don’t know what happened!; I don’t remember visiting any dodgy websites, downloading any weird apps, opening any suspicious emails or attachments, let alone links!, why I am receiving these sms & email notifications from my Bank!?!?” Sounds familiar right? Come to think of it, in most cases the unsuspecting victim is being honest. That being said, I just remembered something; a previous write up revolving around one of the methods used to carry out this type of attack. It can happen to anyone, in fact I was once a victim!

 

 

What is a keylogger? 

Read more

Youth Pathways into Cybercrime

Acrobat Youth Pathways into Cybercrime
Author: Research leads: Professor Mary Aiken, Professor Julia Davidson & Dr Philipp Amann
Source: http://www.mdx.ac.uk/
Overview: Many security and police professionals spend their time analysing the technical and mechanical aspects of cybercrime, dissecting malware and exploit tools, forensically analysing code and techniques. However, few actively focus on the social and psychological aspects: who for example is the attacker, what motivates them, and more importantly how and when did this deviant behaviour begin? Understanding the behavioural and developmental aspects of cybercriminality is becoming increasingly important, and underlies the necessity of a shift in focus from sanctions to deterrence and prevention. That being said, there is an urgent need to understand the pathways that lead some young people into cybercrime hence it is important for parents to be aware of their own youth’s online activity and risk. Read More

The Italian Connection: An analysis of exploit supply chains and digital quartermasters

Acrobat The Italian Connection: An analysis of exploit supply chains and digital quartermasters
Author: Ned Moran and Ben Koehl
Source: http://blog.shadowserver.org
Overview: On July 5, 2015 an unknown hacker publicly announced on Twitter that he had breached the internal network of Hacking Team – an Italian pentesting company known to purchase 0-day exploits and produce their own trojans. Read More