Latest Posts with security tag

security

279 Articles 2 Followers


eBay Protection Messed Up - Here Is Why - December 2020

17 Dec 2020 1 minute read 0 comments XTRM

This would normally be an email consignment that is dropped in File-13 as some kind of eBay Scam or the like that fraudsters get up to involving eBay - However this mess up is Official from eBay dot com. If you have an eBay account - just nip into th...

Server Room Safety and Security Consideration Case Study Server Room GDLN UNUD 2012

7 Dec 2020 14 minute read 4 comments 0fajarpurnama0

Note This is my undergraduate assignment already in English in the Environmental Studies and Occupational Health & Safety course and I remembered that I was asked to write in Indonesian next time due to that time, English language was not yet support...

Some Justice for Phone Scammers

3 Dec 2020 1 minute read 9 comments Matthew Rosenquist

You know those spam calls that threaten money is owed to the IRS and if you don’t pay over-the-phone you will be arrested?  How about the call that the US Immigration will deport you if you don’t pay.  All annoying scams.  But, highly profitable for...

Are Your Communications Safe?

2 Dec 2020 1 minute read 10 comments CryptoVS

So you have your seed phrase or wallet key written down,  and you have put them away for safe keeping until you are ready to cash out on the next moonshot . You have your Ledger, or Trezor loaded with your Hodl bags locked away in your safe and now y...

KYC verification and its risks

1 Dec 2020 2 minute read 2 comments Itsrich

Well, personally I think this is quite an important topic to discuss, because everyone should give great importance to their identity. At present it is almost a custom to carry out the KYC verification, even the most paranoid users have come to carry...

Documenting Risk Assessments

30 Nov 2020 11 minute read 2 comments shellatreille

It is important for an organization to perform risk assessments on their WLANs (Wireless Local Area Networks) and IP (Internet Protocol) Mobility.  Risk assessments should be performed regularly.  They are an important part of risk management procedu...

A Crypto Encyclopedia about crypto security, hacks, frauds and scams

28 Nov 2020 5 minute read 41 comments PVMihalache

Wrote before about scammers, scam projects and collated an basic guide on how to avoid scams. To avoid losing money, the number 1 rule is ... don't be stupid. No one gets rich overnight.  Treat everything with caution and go through the whitepapers....

Mobile Device Security Models

28 Nov 2020 13 minute read 0 comments shellatreille

This is a paper that I wrote in the Spring of 2020 for my Networking class. Introduction Windows Mobile Phone OS, Google Android, and Apple iOS are operating systems (OS) for mobile devices.  Each OS has advantages and disadvantages with regards to t...

Dispelling modern myths about passwords

26 Nov 2020 3 minute read 0 comments Luca B

In the previous posts of this series, it has been described why in general most passwords are insecure, why everybody created insecure passwords for more than 15 years despite their best intentions, and how hackers are quickly cracking these password...

GoDaddy allowed popular crypto domains takeover

23 Nov 2020 2 minute read 1 comment ircrp

GoDaddy one of the most popular go to place for domain hosting is currently under security scrutiny after allowing high profile cryptocurrency domains to be taken over. The report highlights that a social engineering scam carried out on GoDaddy's emp...