What is happening On Wednesday February 23rd, 2022, Russian troops outside of Ukraine began infiltrating the borders of the Ukraine. Despite all the warnings and threats of sanctions from NATO nations, Russia continued to invade Ukraine territory. Since then, Russian troops have taken control of Chernobyl, and there has been bombings and clashes in Ukraine’sContinue reading “Russian Invasion of Ukraine”
These days many people are interested in Cryptocurrencies like Bitcoin, Dogecoin, and Ethereum. Is this something worth looking into from a cybersecurity standpoint or is it all a scam? I’m going to describe what cryptocurrency is, share what I’ve found from my research on the legitimacy of cryptocurrency, what one cybersecurity reporter says about it,Continue reading “The World of Cryptocurrency”
Do you know how secure your smart TV is? What about your phone? Is Siri constantly listening and recording waiting to hear “Hey Siri”? What is it doing with that information? What about your baby monitor? In 2018 NPR reported a South Carolina mother’s baby monitor had been hacked. She thought it was her husbandContinue reading “Creating a Consumer Secure Market Place”
In 1988 Wes Craven’s “Nightmare on Elm Street 4 – The Dream Master” was released. It was the same year Microsoft released Windows 2.1. I’m betting even Wes Craven couldn’t have imagined a scenario quite like PrintNightmare. Microsoft has tried to fix PrintNightmare 3 different times and they are going on their 4th. I’m goingContinue reading “PrintNightmare IV – The SYSTEM Master”
This article was presented at the University of Houston as a final term paper.
Installing Kali Linux on a Raspberry Pi If you haven’t used, Kali Linux is an excellent tool for penetration testing. It’s widely used by Information Security experts and can help determine vulnerabilities in your environment. You do need to know how to use all the tools that come pre-installed in order for you to testContinue reading “Hackberry Pi”