Category: Security
Application Security
Hackers take advantage of unsupported software
If your version of any software system is no longer supported, you are putting your…
Nmap Decoy Scans – The Hamburger
TLP: Public Nmap Decoy Scans – The Hamburger Hackers are using the nmap -D option…
Common incoming TCP/UDP hacker scans against your firewall
TLP:Public Common TCP and UDP port scans that people see against their firewalls. Since March…
The Hidden China’s Maxim – Leave No Access Point Unexploited: The Hidden Story of China Telecom’s BGP Hijacking
Hijacking Internet Traffic not covered by the anti-theft 2015 Xi-Obama Agreement Surprisingly, the voluntary 2015…
Is Blockchain Technology Seriously Overvalued?
Is Blockchain Technology Seriously Overvalued? What amazes me these days is how people can take…
Social Media Disinformation Bots, Sockpuppets and Trolls the new additions to Cyber Security
The problem for Cyber Security with social media these days is the huge amount of…
Microprocessor Speed vs Security Flaw
Microprocessor Speed vs Security Flaw Spectre and Meltdown are both flaws in every modern microprocessors,…
Meltdown and Spectre Vulnerabilities
Meltdown and Spectre Vulnerabilities New York, NY – We at Adept Technologies have already updated…