Vasileiadis A. (CyberKid)Protect your WiFi from HackersWi-Fi Hacking is much easier than most people think and the way to achieve it is some common techniques that most hackers use. With a few…Aug 294
Vasileiadis A. (CyberKid)Detect hidden surveillance cameras with your phoneA family recently it had a big surprise on their Airbnb: a hidden camera disguised as a smoke detector in the living room, monitoring their…Aug 534Aug 534
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceA True Random Number Generator: Jitter FluctionsThe core of your security is typically explicitly linked to one thing … pseudo-random number generation. While we can integrate with a…8h ago8h ago
Prof Bill Buchanan OBE FRSEThe End of Role-based Security and the Rise of Attribute-based SecurityThe Internet is over five decades old, and still, we have data breaches and cybersecurity compromises. One of the problems in this relates…Aug 238Aug 238
Vasileiadis A. (CyberKid)Protect your WiFi from HackersWi-Fi Hacking is much easier than most people think and the way to achieve it is some common techniques that most hackers use. With a few…Aug 294
Vasileiadis A. (CyberKid)Detect hidden surveillance cameras with your phoneA family recently it had a big surprise on their Airbnb: a hidden camera disguised as a smoke detector in the living room, monitoring their…Aug 534
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceA True Random Number Generator: Jitter FluctionsThe core of your security is typically explicitly linked to one thing … pseudo-random number generation. While we can integrate with a…8h ago
Prof Bill Buchanan OBE FRSEThe End of Role-based Security and the Rise of Attribute-based SecurityThe Internet is over five decades old, and still, we have data breaches and cybersecurity compromises. One of the problems in this relates…Aug 238
Vasileiadis A. (CyberKid)Scan the entire web in 45 minutes with Zmap!Most of you know the power of nmap and nmap scripts to identify a target and networks in general. These tools can be used for numerous…Jul 292
Prof Bill Buchanan OBE FRSEAttribute CertificatesAnyone who knows something about identity and authorisation will know that they are often best separated from each other and where an…6h ago
Into Cyber -- Joseph Howard, PhDA Brazen Claim from a Cyber Newbie: Hands-On Skills aren’t EnoughA little over a year ago I began considering the possibility of a career pivot into cybersecurity. It would be a major change for me and…Aug 811