• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

Week 13: Evasion Techniques

Obsolete, outdated software puts Victorian hospitals and police at risk of cyber attacks

November 21, 2017 by Donald Hoxhaj 1 Comment

http://www.theage.com.au/victoria/obsolete-outdated-software-puts-victorian-hospitals-and-police-at-risk-of-cyber-attacks-20171129-gzv9ov.html

Obsolete, outdated software puts Victorian hospitals and police at risk of cyber attacks

This article talks about the following: Cyber-Attacks have been threatening the hospital industry too. The recent case of Victoria’s critical services such as Police, Hospitals, and Child protection have been victims of these attacks and this has been attributed primarily to outdated computer systems. These outdated systems were never updated with security patches for a long time by the developers and this has led to huge losses in terms of data, financial, and patient records from hospitals.

It will be interesting to see how things unfold in the future. Is this a problem of negligence, lack of government control, or lack of financial resources? In either of the case, it has ultimately become a disaster and until this is taken care now, it would only aggravate over the next couple of years. How can the Victorian government ensure safety of critical care services? Will they be ready to make capital investments in these areas and at the earliest?

Nato warns of WW3 ‘hyper war’ after constant cyber-attacks from North Korea, China and Russia

November 21, 2017 by Donald Hoxhaj Leave a Comment

https://www.thesun.co.uk/news/5035127/north-korea-china-russia-cyber-attack-threat-hyper-war/

Nato warns of WW3 ‘hyper war’ after constant cyber-attacks from North Korea, China and Russia

This article talks about the following: The increasing threat from North Korea and China, especially cyber-attacks, has caused fear across the world. There is a feeling that Machine Learning and Artificial Intelligence will do more harm than good and in the coming years will cause Hyper-war.

It will be interesting to see how things unfold in the future. Will Machine Learning and Artificial Intelligence be a good thing for the society going ahead or will transform into a giant ball of fire? Will countries co-operate with each other to secure networking lines and create Cyber Security Procedures to prevent leaks? We just hope that this doesn’t turn out to be another Russian cyber-attack on US presidential elections.

Criminals look to machine-learning to mount cyber attacks

November 21, 2017 by Donald Hoxhaj Leave a Comment

https://www.scmagazineuk.com/criminals-look-to-machine-learning-to-mount-cyber-attacks/article/710215/

Criminals look to machine-learning to mount cyber attacks

This article talks about the following: Machine learning, as per McAfee, will be used extensively by cyber attackers in the coming years because of the nature of the system to do multi-fold combinations. In the coming days, the attackers would use ML so easily that they would be able to talk in their native language and still carry out phishing attacks, making it far more difficult to recognize these attacks.

It will be interesting to see how things unfold in the future. With this, most companies have started adopting serverless apps i.e. apps hosted on virtual systems. How can security professionals be warned of such attacks? Are there systems today that can detect phishing packets easily and warn users?

  • « Go to Previous Page
  • Page 1
  • Page 2

Primary Sidebar

Weekly Discussions

  • Uncategorized (33)
  • Week 01: Overview (2)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (11)
  • Week 04: Vulnerability Scanning (14)
  • Week 05: System and User Enumeration (13)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (17)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (13)
  • Week 12: Web Services (18)
  • Week 13: Evasion Techniques (13)
  • Week 14: Review of all topics (11)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in