Your Home Router Could Be Infected – The Destructive VPNFilter Malware Is Worse Than We Thought

According to new research by Cisco Talos and its additional intelligence groups, the VPNFilter malware that was discovered in the previous months is much worse than originally thought. New modules in stage 3 were discovered. Also, the list of known affected devices has expanded, effectively increasing VPNFilter's attack surface. In the days Cisco's first findings... Continue Reading →

This Month in Cybersecurity News [June 2018]

I've been neglectful on posting cybersecurity news lately. To make up for it, here are some of the hot cybersecurity events that occurred this month. The New OnePlus 6 Smartphone - Serious Bootloader Vulnerability The Chinese smartphone manufacturer, OnePlus, just released the all new OnePlus 6 smartphone last month. With its high-end specifications, glass-design, large... Continue Reading →

Transmission Control Protocol (TCP)

"Transmission Control Protocol (TCP)" is defined in RFC 793. Its purpose is to govern the way in which computers exchange data and describe how reliable connections are created between a sending machine and a receiving machine. TCP works together with "Internet Protocol (IP)." Together, the TCP/IP protocol suite make up the rules that define the... Continue Reading →

The OSI Model & TCP/IP Model

The Open Systems Interconnection (OSI) model is a generic reference to understanding how computers communicate with each other. It's not meant to be an exact science, but rather a guide to help us visualize what happens during node-to-node communication. I once made a post on the OSI model before, but it was lacking detail. There... Continue Reading →

How Does DHCP Work?

Dynamic Host Configuration Protocol, or DHCP, is used to provide quick and centralized management of IP addresses and other TCP/IP settings on your network. These are things like host IP address, subnet mask, DNS settings, default gateway address, and so on (I call these "IP configuration settings"). When you power on your computer, a DHCP... Continue Reading →

Firewalls: A Fundamental Introduction

The defense in-depth design is a security philosophy that proposes we protect our assets and networks with multiple levels of security. The idea is not strictly limited to technical security controls, as management and operational controls have their rightful place in the defense in-depth approach. However, many aspiring and enthusiastic young learners falsely attribute the... Continue Reading →

Up ↑