Home » Articles

Articles

Cyber-security: A Rising Threat in the Middle East

According to the Middle Eastern Global Economic Crime Survey Report (2016), cybercrime is one of the highest economic crimes reported in the Middle East, affecting 30% of organisations in 2016. This surge in cybercrime is ultimately the result of the Cooperation Council for the Arab States of the Gulf (GCC) pursuing unique structural reform initiatives, aimed at reducing reliance on ... Read More »

Some countries are opening doors to adopt cryptocurrencies in a larger scale

Different countries around the world are facilitating the use of cryptocurrencies for monetary operations. Estonia Estonia, known already for being a technologically leading country, deeply analyzed and proposed, is set to issue a new legal cryptocurrency, named Estocoin, that would be recognized as a legal currency. Kaspar Korjus, Managing Director at e-Residency, posted in a Blog that the country would ... Read More »

Loopix: New Anonymization Service?

We are living in times where governments and corporations are spying on internet users, and some countries are banning or threatening to weaken privacy enhancing technologies such as Virtual Private Networks (VPNs) and encryption, and calling for more surveillance and data retention. Now more than ever internet users need technology which preserves their digital privacy rights. Currently there are only ... Read More »

Risks Of The Double Spending Attack

You may not know that Bitcoin is not the first digital coin project in history. Before it, other ideas were developed in order to create a digital currency but they all failed due to a very serious security issue that developers were not able to solve. Just to use simple words, when you spend your banknotes, you have to physically ... Read More »

Testing Modern Antivirus Software part 1

This is an introduction to this vast topic in which we will focus on evading AV signature detection attempts to run Metasploit’s windows/shell/reverse_tcp payload under the nose of Kaspersky, Avira, Avast and 58 other (on their VirusTotal edition). Let’s start with information gathering – what AV actually does in order to stop malware. Static countermeasures, aka scan-time analysis Static signature ... Read More »

Fileless Malware – Rising Trend in Malware Industry

Fileless malware is becoming more popular in blackhat activities. What was first seen in some sophisticated targeted attacks is now becoming a standard partially due to the Vault 7 leak that revealed CIA’s modus operandi. There seems to be confusion about the definition of fileless malware so news sites will often say malware is fileless while it’s definitely not fileless. ... Read More »

μProxy – A Hardware Relay Solution for Protecting Geolocation Anonymity of Internet Users

Anonymity and privacy of internet users have attracted considerable attention during the past few years. A pivotal privacy issue is that a user’s geographical location can be pinpointed, if his/her IP address has been detected, giving the attacker a relatively precise real-time location. In most cases, this information is adequate for an attacker, to close in and eventually determine the ... Read More »

Installing VMware Player in Linux (Tutorial)

In this article, I will be showing you how to install the latest version of Vmware Player on a Linux Distro. For the tutorial I will be using Ubuntu, in particular Ubuntu Mate. I choose Vmware Player over Oracles Virtual Box, due to a number of reasons including simplicity and performance. Navigate to the official Vmware website which currently is ... Read More »

The Art Of Google Hacking

When it comes to Google, everyone feels confident in knowing what we’re talking about. Google is that nice site that allows us to search whatever we want on the web. More technically, it’s a search engine, something that knows our preferences, our tastes and even (sometimes) our secrets. Google is easy, isn’t it? It appears as a blank page with ... Read More »

An Overview of Modern Tor Deanonymization Attacks

Tor was designed to provide a decentralized, censorship resistant network that can offer internet users, websites and various web services anonymity via easy-to-implement means. Nevertheless, since the advent of Tor, some users have failed to maintain their anonymity. Throughout this article, we will discuss Tor’s deanonymization techniques that are available today. We will go through traffic and timing correlation attacks, ... Read More »

How Hackers Avoid Honeypots

  Honeypots are networks, servers or web applications purposely built to appear vulnerable, thus showing obsolete operating systems and software, open services and ports, in order to attract malign visitors and induce them to try exploiting the system. While in a preceding tutorial I explained how to build your own honeypot, here I will explain how hackers try to avoid ... Read More »

Tutorial – How To Host Your Own DNS Website Domain On Ethereum’s Blockchain

You can now host DNS domains on Ethereum’s blockchain through ENS, which is short for Ethereum Name Service, a distributed, extensible domain naming system that relies on Ethereum’s blockchain. This is possible via adjusting the domain name server settings to point to gateway DNS servers, which resolve lookups through checking an ENS registry that points to resolvers including the zone ... Read More »

How To Setup Your Own Pentest Lab

Are you an aspiring penetration tester, or a wannabe hacker? You started from the basics, querying google with a few simple words: hacking, hacker, how to be a hacker…then you found a lot of stupid tutorials that taught you how to hack your neighbour’s wpa with a network adapter called alfa awus036h (but didn’t work, did it ?) and finally ... Read More »

Introduction to Bitcoin Transaction Accelerators

As we watch Bitcoin blockchain scaling issues popup, their weight can be felt by users. The waiting list for BTC transaction sometime grows beyond control, causing users either to pay a large fee or to content with delayed transactions. Some Bitcoin service providers, however, offer Bitcoin transaction accelerator services intended to help clear the pending Bitcoin transactions and make them ... Read More »

port_scan_monitor_sc.gif

Examining Port Scan Attacks Via Data From Darknets

Port scanning is a preliminary approach that is most commonly used by hackers in order to determine vulnerable hosts that they can attack successfully. Scanning is a fully automated process that is utilized by hackers to detect machines, servers and peripherals that exist on a given network. A successful scan can yield details of machines discovered on the scanned network ... Read More »