-
Donald Hoxhaj commented on the post, Amazon to Let Delivery Drivers Open your Front Door, on the site 6 years, 10 months ago
Hi Elizabeth,
Now that’s an interesting innovation from Amazon for sure. Amazon has previously innovated many products, but in terms of security of goods and services, this secure lock is definitely worth the money. This will ensure that the goods delivered are safe and are not stolen or opened. -
Donald Hoxhaj commented on the post, Blackberry and the future, on the site 6 years, 10 months ago
Hello Neil,
That’s an interesting article to share and learn. Blackberry’s case if quite interesting because it uses one of the most secure operating systems that is quite closely connected to the internal networks. Despite this the threat of cyber-attacks has become so common that companies need to constantly change and implement new sec…[Read more] -
Donald Hoxhaj commented on the post, Another Facebook Bug Allowed Anyone to Delete your Photos, on the site 6 years, 10 months ago
That’s quite an interesting news and I am surprises to see such flaws from world’s largest social networking community. This is pure case of internal system fix and stands a good example for many businesses related to this. It’s good that it was reported on time before any potential violation occurred and extracted personal images.
-
Donald Hoxhaj commented on the post, Retail and Hospitality Breaches Declined Over Past 2 Years, on the site 6 years, 10 months ago
Elizabeth,
This is fantastic news. I think this is what is required from critical care services such as hospitals and especially mass businesses such as retail. Strengthening the PoS systems with chip cards and EMV are great examples as they do not store any data. It would be interesting to see how advancements in these areas take shape. -
Donald Hoxhaj commented on the post, Unsecured Network-Enabled Car Components Could Cause Widespread Deaths, on the site 6 years, 10 months ago
Matt,
Networks in car is still untested and any developments there would obviously not be tested to every possible extent. In fact, with IoT in picture, most user gadgets including mobiles, iPods, etc. are connected with a car’s network system. Hackers can easily find loopholes in the network. How could this be prevented? It is quite well known t…[Read more] -
Donald Hoxhaj commented on the post, Android Spyware That Spies On Whatsapp and Skype Calls, on the site 6 years, 10 months ago
Richard – That’s really shocking to know. Spyware has become so common and these attacks question our security practices. It’s surprising that Android Spyware could actually do this. I doubt if the spyware can also have access to mobile’s internal data and contact information? If yes, then I believe many users would be subjected to this attack.
-
Donald Hoxhaj commented on the post, Russian Cybersecurity Software Found on U.S. Government Computers, on the site 6 years, 10 months ago
Jonathan,
I think this is referring back to the cyber security attacks during the US Presidential elections. This is quite a shocking story and it’s still unsure how Russian cyber security software was able to penetrate network systems into the world’s most advanced networks. -
Donald Hoxhaj commented on the post, WordPress Plugin Used by 300,000+ Sites Found Vulnerable to SQL Injection Attack, on the site 6 years, 10 months ago
Hi Brent,
Thanks for sharing your views. WordPress in fact also has many other vulnerabilities. I have personally used it and though it is widely preferred for web application and search development, its security practices are not strong enough to prevent such attacks and this was quite obvious as I read the article. There has to be a lot of…[Read more] -
Donald Hoxhaj commented on the post, China has launched another crackdown on the internet — but it's different this time, on the site 6 years, 10 months ago
Hey Elizabeth,
This was a great article indeed. China has always surprised the world with its constant innovation and developments, being a closed economy. It put a ban on Google, Facebook, Yahoo, etc. to protect its internal systems. All these companies failed to make a mark and in fact, local companies in China, example, Baidu, rose up to show…[Read more] -
Donald Hoxhaj commented on the post, Accenture latest firm caught with lax cybersecurity, on the site 6 years, 10 months ago
Hello Amanda,
This article is quite interesting because it throws light on the fact how big companies can too struggle in protecting their sensitive information. The case of Accenture is quite surprising though, but many corporations ignore threats or instance of attacks and later struggle with breaches. -
Donald Hoxhaj commented on the post, US Identifies 6 Russian Government Officials Involved In DNC Hack, on the site 6 years, 10 months ago
Younes,
I was shocked after reading this article because our own government services, whom we trust, are involved in this. This news has been for quite some time and it is shocking to see Russian government officials involved in hacking DNS systems. How will United States counter this problem anyways? Will such threats be a thing of the past or…[Read more]
-
Donald Hoxhaj commented on the post, New Banking Malware with Network Sniffer Spreading Rapidly Worldwide, on the site 6 years, 10 months ago
Brent,
That’s an interesting article for sure. It has practically becoming very concerning to trust banks. The recent attacks on Australian banks too has put up a question to raise i.e. Whom should we trust to safeguard our hard earned money? The thing to actually see is how soon can banks overcome this crisis and put an end to malware attacks -
Donald Hoxhaj commented on the post, Discussion Week 12, on the site 6 years, 10 months ago
Hi Neil,
Your answer to the question was quite interesting. I see a TCP more as a regulator of traffic than a security prevention protocol. It would ultimately ensure that the bandwidth requirements are met and that the speed of the network is utilized to its full potential. However, I feel that security layer at TCP is very essential so that a…[Read more] -
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 10 months ago
US charges three Chinese nationals over hacking
This article talks about the following: It is well known that Russia and China have been growing threats in the cybercrime space. In the latest update, the United […] -
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 10 months ago
How UK cops are becoming ethical hackers
This article talks about the following: Cyber Crime is a growing threat and its knowledge in the security forces is limited because of lack of training systems. Because […]-
interesting. I think they have training because nowadays, crime is more cyber I guess.
-
Interesting article. I have not read anything related to this before. The UK took an interesting approach to tackle the increase in cyber security for the country. It is definitely known that everywhere is short when it comes to cyber security professionals. It is a profession in high-demand. After taking the Forensics class in ITACS, this could help. There are laws/rules when it comes to collecting electronic evidence at a crime scene and when assessing the evidence. Cyber skills can easily help the police force when it comes to assessing this type of evidence and are not in a waiting stage while the investigation is waiting on the forensic investigator to assess the device and provide meaningful information to them. Additionally, the police force will have the ability to access data quickly. They will be able to image the devices to create identical bit-by-bit copies. I am really interested in the statistics after this and to see if this has had a positive impact for the UK. Maybe other countries can apply it as well.
-
Donald,
Very interesting article, I do believe so many government departments will do the something. We will see more government employees having training sessions in Cyber Security.
-
-
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 10 months ago
NHS turns to ethical hackers to defend it from malicious attacks
This article talks about the following: The growing threat of cyber-attacks has prompted the UK National Health Service to invest £20m on cyber […] -
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
Obsolete, outdated software puts Victorian hospitals and police at risk of cyber attacks
This article talks about the following: Cyber-Attacks have been threatening the hospital industry too. The recent case of […]-
The article contains serious information on the situation. It states that the five government outfits were audited, which included the Department of Health and Human Services and Victoria Police, yet none of the were able to satisfy the auditors. Almost half of the systems were obsolete and 80% were close to or beyond their end of life. I can’t imagine that Victoria (in Australia) is not aware of the cyber attacks happening around the world, so a few reasons for this come to mind. Is it possible they do not have funding for this? Do they not have a cyber security plan, disaster recovery plan, etc. in place? Do they not have the cyber experts to help them? None of these would be valid reason, but they are excuses in my opinion. I believe at this stage, there is no excuse for poor security or not patching your system. If you need new hardware/software then get it. It is not worth the risk in my opinion.
-
-
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
Nato warns of WW3 ‘hyper war’ after constant cyber-attacks from North Korea, China and Russia
This article talks about the following: The increasing threat from North Korea and China, especially cyb […] -
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
Criminals look to machine-learning to mount cyber attacks
This article talks about the following: Machine learning, as per McAfee, will be used extensively by cyber attackers in the coming years because of the […] -
Donald Hoxhaj commented on the post, Discussion Week 11, on the site 6 years, 11 months ago
Hi Fred,
I absolutely agree with you that security tool implementation or withdrawal needs to be discussed with employees and those at the user levels before making a decision. Most organizations try to force upon decisions or changes on employees without a consent. Nevertheless, as you mentioned, as long as the situation demands and specific…[Read more]
- Load More
Donald,
We live in a big fear of having my devices hacked by someone and be cyber attacks victims. In my opinion law has to be playing a big rile to protect us, this can of justice moves to press charges on people who attack others will teach a lesson to others who think about doing the something.
Thank you for the article.