The Future of Wi-Fi Security: Assessing Vulnerabilities in WPA3

By William Chalk
A new study by researchers Matty Vanhoef and Eyal Ronen revealed five vulnerabilities – collectively named ‘Dragonblood’ – in the WPA3 Wi-Fi standard. Four of the five are considered a severe threat to online security. What does this t… Continue reading The Future of Wi-Fi Security: Assessing Vulnerabilities in WPA3

Cybercriminals are becoming more methodical and adaptive

Cybercriminals are deviating towards a more focused approach against targets by using better obfuscation techniques and improved social engineering skills as organizations improve in areas such as time to detection and response to threats, according to… Continue reading Cybercriminals are becoming more methodical and adaptive

Cisco fixes serious DoS flaws in its email security appliances

Cisco has plugged a heap of security holes in many of its products, including two vulnerabilities (one critical) that open its email security appliances to denial of service attacks. About the vulnerabilities Both vulnerabilities affect the Cisco Async… Continue reading Cisco fixes serious DoS flaws in its email security appliances

35C3: A Deep Dive into DOS Viruses and Pranks

Oh, the hijinks that the early days of the PC revolution allowed. Back in the days when a 20MB hard drive was a big deal and MS-DOS 3.1 ruled over every plain beige PC-clone cobbled together by enthusiasts like myself, it was great fun to “set up” someone else’s machine to do something unexpected. This generally amounted to finding an unattended PC — the rooms of the residence hall where I lived in my undergrad days were a target-rich environment in this regard — and throwing something annoying in the AUTOEXEC.BAT file. Hilarity ensued when the mark next booted the …read more

Continue reading 35C3: A Deep Dive into DOS Viruses and Pranks

DooM Retrospective: 25 Years of Metal

Metal is many things. A material hard and coarse in nature that by forging it in fire becomes sharp enough to cut through anything in its path. The music that bares its namesake is equally cutting and exudes an unyielding attitude that seeks to separate the posers from the true acolytes. Metal is the sentiment of not blindly following the rules, a path less taken to the darker side of the street. In videogame form, there is no nothing more metal than Doom.

The creators of Doom, id Software, were always hellbent on changing the perception of PC gaming in …read more

Continue reading DooM Retrospective: 25 Years of Metal

Tiny Ray Tracer Fits In 64 Bytes

Throughout human history, people try to make the biggest, the fastest, and — sometimes — the smallest. [Hellmood] falls into the latter category and proves it with a 64 byte interactive 3D raycasting application for MSDOS.

Why MSDOS? We suppose why not? The .COM file format is lean, and you can take over everything without a lot of work. If the program were huge, it wouldn’t be very impressive. There are 64 shades of gray which is odd looking these days, however there are versions that use various color palettes and each one fits in 64 bytes or less. There’s …read more

Continue reading Tiny Ray Tracer Fits In 64 Bytes

Man who conducted DDoS attacks on Sony, Xbox & EA pleads guilty

By Waqas
Austin Thompson, a 23-year-old man from Utah has pleaded guilty to conducting DDoS attacks on gaming giants between 2013 to 2014. Among his targets were companies like EA Origin, Sony’s PlayStation Network, Steam, Microsoft’s Xbox,… Continue reading Man who conducted DDoS attacks on Sony, Xbox & EA pleads guilty

Cisco security appliances under attack, still no patch available

A vulnerability (CVE-2018-15454) affecting a slew Cisco security appliances, modules and firewalls is being exploited in the wild to crash and reload the devices, the company has warned on Thursday. About CVE-2018-15454 The vulnerability is in the Sess… Continue reading Cisco security appliances under attack, still no patch available