December 2020 Roundup

December 2020: Cybersecurity Roundup

This past month in cybersecurity:

  1. Multiple US Government Agencies Hacked
  2. Swatting “pranks” via Smart Home Devices
  3. Cyberattacks Against Vaccine Distribution Operations
  4. 45 Million Medical Images Openly Accessible Online
  5. Baltimore County Schools Ransomware

Read More

November 2020 Roundup

November 2020: Cybersecurity Roundup

This past month in cybersecurity:

  1. Chase Unlimited Reward Point Vulnerability
  2. Apple lets some Big Sur Network Traffic Bypass Firewalls
  3. Cit0day Leaks 23,618 Hacked Databases
  4. Tesla Model X Key Fob Hack
  5. Hacked Crypto Exchange KuCoin Recovery

Read More

Raspberry Pi Vulnerability Scanner

Network Vulnerability Scanner Built On Raspberry Pi

We recently developed a plug-and-play vulnerability scanner built on a Raspberry Pi. And by plug-and-play, we actually mean that; you plug in the Raspberry Pi to your router, and within a few hours, you will receive an OpenVas network vulnerability report to your email.

For those that thought “YUM!” when mentioned above, a Rasberry Pi (RPi) is actually a single-board computer that costs around $100 and can be used for a vast range of applications, including home automation and education. If a fruity pastry had the same capabilities, that would be an impressive, albeit slightly expensive, treat!

The entire project is open source, and once you buy the device and peripheral set-up equipment, the scanner is FREE to run as many times as you want! This article will walk you through the “why” you’d want this and “how” you can create your own home network vulnerability scanner. Let’s jump in!

Read More

October 2020 Roundup

October 2020: Cybersecurity Roundup

This past month in cybersecurity:

  1. October is Cybersecurity Awareness Month
  2. T2 security chip on Macs can be hacked
  3. ‘Security of your vote has never been higher’
  4. CLEAR, expedited security, expanding to a holistic identity verification platform
  5. Data breach at Barnes & Noble

Read More

September 2020 Roundup

September 2020: Cybersecurity Roundup

This past month in cybersecurity:

  1. Space Policy Directive-5 Cybersecurity Principles for Space Systems
  2. Zerologon Windows Vulnerability
  3. Woman Dies During a Ransomware Attack on a German Hospital
  4. New Bluetooth Vulnerability aka BLURtooth
  5. #Instagram_RCE Code Execution Vulnerability in iOS/Android App

Read More

Roku Skip Commercials

Click here to try it out now!

The One about the Backstory

Bri and I used to love watching F·R·I·E·N·D·S on Netflix, but starting at the beginning of 2020, NBC decided to end their contract with Netflix and move the show to HBOMax instead.

Unfortunately, we don’t have HBOMax, and we’re unwilling to shell out the additional $15-a-month to watch a show we’ve already seen at least 3 times through.

However, we are willing to pay $65-a-month for YouTube TV because we love watching live sports like this month’s Tour de France. Even better, YouTube TV has unlimited DVR, which has proven to be the best feature of the whole service.

The best part about YouTube TV’s DVR is that you can navigate to a show you want to record (like Friends) and add the entire show to your DVR. Then, as episodes of your show air, it will automatically be added to your DVR.

Using this method, we have collected every episode of Friends in our YouTube DVR using a single button.

Read More

August 2020 Roundup

August 2020: Cybersecurity Roundup

This past month in cybersecurity:

  1. Amazon Alexa security bug allowed access to voice history
  2. New Crocodile Hunter tool can identify fake cell towers
  3. Election security takes center stage at Blackhat 2020
  4. NIST COVID-19 Cybersecurity Act introduced
  5. Twitter fined $250M for misusing 2FA phone numbers and emails in marketing

Read More

Tor and HTTPS Diagram from https://www.eff.org/pages/tor-and-https

Maximizing Privacy Online

If you have ever taken an interest in retaining your anonymity and privacy online, you have almost certainly seen the acronyms HTTPS, VPN, and Tor come up. While each of these technologies provide a layer of privacy, each has a distinct set of advantages and limitations that you should be aware of. It’s even possible to use all three at the same time to maximize privacy!

We will explain how these technologies can be used together, but first, let’s take a look at each one individually.

Read More

July 2020 Roundup

July 2020: Cybersecurity Roundup

This past month in cybersecurity:

  1. Twitter suffered a major hack on high-profile accounts
  2. Russian hackers targeted COVID-19 vaccine research organizations
  3. The UK planned to bar Huawei from 5G network
  4. Kentucky’s unemployment system had a 2nd data breach
  5. China suspected of hacking the Vatican

Read More

Logo Pyramid

Maintain your Privacy Online

The expression “you can run, but you can’t hide” has never been truer than on the Internet today. Protecting your privacy seems harder than ever with companies like Google and Facebook tracking your every move online and U.S. laws like the Freedom Act giving the government broader access to your browser and search history. And if that isn’t enough, frequent data breaches have resulted in your most sensitive information being made public on the dark web.

It’s not all doom and gloom, though, a variety of companies have dedicated themselves to providing everyday users with the tools they need to protect their right to privacy. In this article, we will walk you through some of the tools that we use to protect our privacy.

Specifically, the tools we will be covering are:

  1. Brave Web Browser (with Duck Duck Go)
  2. Nord VPN
  3. Firefox Send (when it comes back…)
  4. Wire
  5. Privacy.com

Note: We are not sponsored by any of these tools and make absolutely no money by endorsing them. We are simply spreading the word about privacy tools we love to use.

Read More

Your browser is out-of-date!

Update your browser to view this website correctly. Update my browser now

×