-
Shi Yu Dong commented on the post, Two New Curves Added to NIST SP 800-131A Rev. 1, on the site 6 years, 11 months ago
Hi Fraser:
Great post! I think the curve encryption is very important to both business companies or government. By adding Curve 25519 and Curve 448 definitely will help the organizations gain a better understand of how to encrypt their documents
-
Shi Yu Dong wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
According to the article, a BBC journalist has discovered a security flaw in the office collaboration tool Huddle that leads to private documents being exposed to unauthorized parties. A huddle is an online tool […]
-
Shi Yu Dong commented on the post, Discussion Week 5, on the site 6 years, 11 months ago
Kerckhoffs’ guideline is a perfect that works ideally, however as we have found in this class and others, cryptographic frameworks regularly have vulnerabilities. Some of these aren’t found for a considerable length of time (See the most recent WPA2 break). This issue is philosophical – humanity isn’t flawless, subsequently we would never o…[Read more]
-
Shi Yu Dong commented on the post, China has launched another crackdown on the internet — but it's different this time, on the site 6 years, 11 months ago
Hi Elizabeth:
Very interesting article and I was very surprise that China implement another laws to restrict the internet users.
-
Shi Yu Dong wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
This article describes that researchers have found a critical vulnerability that users could leak their real IP addresses to potential attackers when they use TOR anonymity browser. Tor (The Onion Router) is free […]
-
Shi Yu Dong commented on the post, Discussion Week 4, on the site 6 years, 11 months ago
In my opinion, I believe that both whitelisting and blacklisting applications can help companies to improve the security system and the secure the data. From my experience, I agree with classmates that it’s depends on the business environment to determine which solution is the best for the security systems. For example, I work for Temple U…[Read more]
-
Shi Yu Dong commented on the post, Singapore wants ethical hackers to get a license, or else, on the site 6 years, 11 months ago
Hi Donald:
Great post. I think the Singapore government is tend to track those who have the hacking skills and limit their ability. However, I really don’t think getting certification for people will stop they hacking other government systems.
-
Shi Yu Dong wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
According to the article, research finds that the iPhone has a serious privacy concern that allows IOS app developers to take your photographs and record your live video using both front and back cameras without […]
-
Shi Yu,
your article is very similar to many articles who came one after Iphone 6 came out with the fingerprint login button. Everyone was talking back then about how Apple was collecting fingerprints of millions of customers all over the world. However, the people knew that an important sensitive information (Fingerprint) can be used against them at anytime and they kept using apple logins.
I do believe that this time again, the people will purchase more new IPhones and will activate their cameras to login using the Face-ID feature even tho they pictures of them and the people around them will be taken without their permissions.
-
-
Shi Yu Dong wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 12 months ago
According to the security researcher, it describes that hackers could leveraging an old Microsoft Office feature called Dynamic Data Exchange to perform malicious code execution on the targeted device without […]
-
Shi Yu Dong commented on the post, WPA2 Cracked, on the site 7 years ago
Hi Fraser:
Interesting article but at he same time pretty scary because WPA 2 is the wireless security for most of Wi-Fi.
-
Shi Yu Dong commented on the post, 5 worst cybersecurity habits with catastrophic consequences, on the site 7 years ago
Hi Amanda:
I think this article is fascinating and try to think like hackers is the best way to prevent any cyber attack
-
Shi Yu Dong wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
Recently, security researchers have discovered a new privilege-escalation vulnerability in Linux kernel that could allow a local attacker to execute code on the affected systems with elevated privileges. In the […]
-
Shi Yu Dong commented on the post, Hacking the election: security flaws need fixing, researchers say, on the site 7 years ago
Hi Jonathan:
Very interesting article and I agree with you that voting system machines have many different vulnerabilities that could affect personal voter information.
-
Shi Yu Dong wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
According to researchers from the cybersecurity firm Proof point, they recently discovered a large-scale malvertising campaign that exposed millions of internet users in the United States, Canada, the UK and […]
-
I think this is a pretty interesting article but also very scary. I saw some analytical data on reddit at one point that p0rnhub has a crazy amount of hits in any given day. This being the case something like this could be a huge problem even if 1% of the people who go the site will go along with it.
-
-
Shi Yu Dong commented on the post, Amazon's Whole Foods Market Suffers Credit Card Breach In Some Stores, on the site 7 years ago
Fascinating article and I agree with you that it will be interesting to see how to eliminate the risk of the data breach in the future. Thank you for sharing.
-
Shi Yu Dong wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
According to the article, it describes that researchers from security firm Duo Labs analyzed over 73,000 Macs system and discovered that a surprising number of Apple Mac computers either fails to install […]
-
Shi Yu Dong posted a new activity comment 7 years ago
Since I have been used Windows for a long time, I would prefer to use Windows. However, when it comes to the question which one is better, I would say people like Linux because the Linux has a better security system and there are multiple different versions of Linux systems. Besides that, Linux is an open resource that developers continue to…[Read more]
-
Shi Yu Dong posted a new activity comment 7 years ago
According to Auto website, the single sign-on is defined as a session and user authentication service that permits a user to use on the set of login credentials to access multiple applications. For the organization, there are many advantages to use single sign-on. One of significant advantage is users can easily access multiple files without…[Read more]
-
Shi Yu Dong wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
A new email scam is targeting Netflix Users in order to obtain access to their bank account information. According to the article, Netflix customers have been received a fake email that appears to come from […]
-
Adeola O Lediju and Shi Yu Dong are now friends 7 years, 1 month ago
- Load More