information security

21 Articles 0 Followers

Infrastructure & Cybersecurity: Considering The World Around Us

24 Feb 2024 6 minute read 0 comments Investigator515

So just how do we secure critical infrastructure anyway? If you’re a regular reader, you’ve probably figured out that while we love cybersecurity topics in general, one of our favourite topics revolves around embedded systems, as well as the attitude...

Bouncin Around: A Quick Look At Onion Routing

19 Feb 2024 4 minute read 0 comments Investigator515

Exploring the Intricacies and History of Onion Routing In this previous article, we explored the history of the dark web including a few notable incidents that have occurred on the dark web. In today’s article, we’ll be looking at some of the technol...

Software Defined Radio & Radio Hacking: Space Communications (Pt 3)

6 Feb 2024 9 minute read 2 comments Investigator515

This is multi part series. To catch up, read Part 1 and Part 2. Or find everything in our publication Radio Hackers. As we’ve explored the world of Software Defined Radio, we started to explain some fundamentals around transmissions, antennas and rec...

Navigating the Digital Landscape: Your Privacy and Social Media

12 Dec 2023 6 minute read 3 comments Investigator515

It’s pretty well known by now, that social media isn’t particularly great for protecting our privacy. While there’s been many notable data breaches over the years, data is also often provided to third party providers for various reasons providing a f...

Cracking the Code: Our New, Radio Based CTF Challenge

27 Nov 2023 3 minute read 0 comments Investigator515

Make your learning fun with CTF style learning about RF topics. Learning is fun, but some days it can be tough. Providing interesting content is always a challenge, and if you’re on the learning side taking in all that new information can sometimes b...

Unlocking Wireless Networks: Kismet and Wardriving Explained

21 Oct 2023 6 minute read 0 comments Investigator515

What you’ll need to detect things in your local environment If you’re a regular reader you might remember this article where we did a walk through on installing Kali on the Pi Zero to create a Kali-Pi to use for cyber research and discovery. Tod...

OSINT Unleashed: 5 More Tools for Cyber Investigators

24 Sep 2023 6 minute read 0 comments Investigator515

We’re back with more essential tools for all investigators, both professional and hobbyists. In this article, we initially explored fundamental tools that were able to be be used for various purposes, being useful for enumeration of websites and sour...

Electronic Fingerprinting: Mobile Devices behind the Shadows

16 Jun 2023 8 minute read 1 comment Investigator515

  Passive tracking is pervasive in today’s world. Let’s talk more about that.  While we’ve all heard about web fingerprinting and had that moment where we wondered if our microphones were listening to us, most of that tracking revolves around the in...

Data Transfer Risk Assessment

24 May 2023 4 minute read 0 comments EmilyGDPR

This blog post focuses on transfer risk assessments (TRAs), starting with the background that led to their implementation and then addressing the following inquiries: What is the purpose of a TRA? Who is subject to TRAs? Why is it significant? How i...

Is Paying Ransomware Now Illegal?

17 Oct 2020 1 minute read 3 comments Matthew Rosenquist

Security experts say don't pay ransomware, but now the U.S. Treasury Department is now declaring it illegal!  Every company on the Internet must deal with the threat and emerging regulations.  Ransomware continues to be a growing problem because vic...