The Problem with Updates

Software Update Header Image

I’ve come across a number of people recently who have installed a piece of malicious software called Snake that disguises itself as an Adobe Flash installer. This isn’t the first piece of trojan software that has affected the Mac and from memory can remember malicious software being packaged with Apple’s iWork and Xcode software previously. What…

Is Nowhere Safe from Cryptomining?

Monero Logo

Not a week goes by without something else being infected with some form of crypto-currency mining software recently; in December one of Starbucks’ Buenos Aires locations was identified as hijacking customer computers to mine Monero when they connected to in-store WiFi; and YouTube recently remedied a vulnerability that would allow crypto mining scripts to be…

Reconstructing a Transmitted File

Finding a JPEG Signature within Hex Fiend

Previously I’ve blogged about taking initial steps using Wireshark to inspect data within a network to see what data might be leaking on a network. If there does happen to be unencrypted information being transmitted on a network you may want to see exactly what that data is in order to know how important the…

Are Cyber Attacks an Act of War?

A Huawei Phone Mast

As the New Year started the most prominent story was that of the Meltdown and Spectre vulnerabilities. The vulnerabilities are certainly huge as they may only be completely resolved by replacing the processor of a device. A story that wasn’t given as much prominence but is a huge development is the cancellation of a deal…

Diving into Wireshark

Wireshark Header Image

Public wifi networks are now so prevalent that they have become relied upon by people for a high percentage of their data usage. With the amount of data now consumed on peoples mobiles and the sometimes stingy data packages offered by carriers; public wifi is sometimes used as a the main internet connection on a…