Cyber Sentinel
Attack on PRNG harms user confidentiality and data integrity

Linux encryption permits DNS cache poisoning

Cyber security researchers report that Linux encryption permits DNS cache poisoning. Weaknesses in entropy used in Linux pseudo random number generation (PRNG) could allow attackers to predict the output keys and break into the encryption process by using a forward attack method (see Gutterman, 2020). Cross-layer attacks where an attacker launches coordinate simultaneous attacks at …


Justice

IoT doorbells enable increase in Swatting

Law enforcement agencies in the US have reported increases in swatting attacks. Swatting refers to a hoax call being made to the police that reports a violent crime in progress at the home of a swatter’s victim. The hoax call often results in armed response units (SWAT) breaking into innocent people’s homes to apprehend a …


Hackers target covid-19 related services.

Immoral hackers endeavour to obtain Covid-19 vaccine research data

2020 saw the onset of the Covid-19 crisis that caused human and financial disasters for every society in the world. The impact of the crisis totally changed the way in which people work, shop, and socialise with a greater emphasis on homeworking, online shopping, and social media. Unfortunately, these changes have resulted in a greater …


Cyber Security for all

Welcome to Cyber Sentinel

Cyber security was once the poor relation to network administration, but has become one of the most important areas of IT. Over the years the number, ingenuity and scale of cyber attacks has grown beyond all recognition and now presents a clear and present danger to everyone using technology. The aim of this blog is …