Cyber security researchers report that Linux encryption permits DNS cache poisoning. Weaknesses in entropy used in Linux pseudo random number generation (PRNG) could allow attackers to predict the output keys and break into the encryption process by using a forward attack method (see Gutterman, 2020). Cross-layer attacks where an attacker launches coordinate simultaneous attacks at …
IoT doorbells enable increase in Swatting
Law enforcement agencies in the US have reported increases in swatting attacks. Swatting refers to a hoax call being made to the police that reports a violent crime in progress at the home of a swatter’s victim. The hoax call often results in armed response units (SWAT) breaking into innocent people’s homes to apprehend a …
Immoral hackers endeavour to obtain Covid-19 vaccine research data
2020 saw the onset of the Covid-19 crisis that caused human and financial disasters for every society in the world. The impact of the crisis totally changed the way in which people work, shop, and socialise with a greater emphasis on homeworking, online shopping, and social media. Unfortunately, these changes have resulted in a greater …
Welcome to Cyber Sentinel
Cyber security was once the poor relation to network administration, but has become one of the most important areas of IT. Over the years the number, ingenuity and scale of cyber attacks has grown beyond all recognition and now presents a clear and present danger to everyone using technology. The aim of this blog is …