• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

Uncategorized

IBM to Buy RedHat!

October 29, 2018 by Sev Shirozian Leave a Comment

What has the world come too!  IBM is buying Red Hat?  The company that used to walk hand and hand with Microsoft Windows back in the day is now moving forward with purchasing Red Hat a major Linux platform.  $33.4 Billion dollars is what the deal is worth.  This is going to help them get deeper into cloud an more enterprise networks.  I thought this was security worthy news given linux is usually the choice of Operating System for security minded people and it’s going to push it forward in the right direction.

 

https://www.bloomberg.com/news/articles/2018-10-28/ibm-is-said-to-near-deal-to-acquire-software-maker-red-hat

Why 802.11ax is the next big thing in Wi-Fi

October 17, 2018 by Haitao Huang 2 Comments

IEEE 802.11ax or Wi-Fi 6 builds on the strengths of 802.11ac, while adding flexibility and scalability that lets new and existing networks power next- generation applications. IEEE 802.11ax OFDMA technology lets even first-wave 802.11ax access points support eight spatial streams and deliver up to 4800 Mbps at the physical layer, depending on vendor implementation. All clients will achieve higher effective throughput at the MAC layer, for a better overall user experience.

https://www.networkworld.com/article/3215907/mobile-wireless/why-80211ax-is-the-next-big-thing-in-wi-fi.html

Twitter API Flaw Exposed Users Messages to Wrong Developers For Over a Year

September 25, 2018 by Connor Fairman Leave a Comment

A flaw in Twitter’s API was sending user’s messages to businesses to the wrong place. There are tools available for businesses to build special applications that interact with Twitter. This is used for things like customer service and Q/A. To build these applications, the company has a developer with a developer key registered with Twitter. When a user uses the app created by the developer, their data/whatever they are sending gets sent to the account associated with that developer’s developer key. What happened here is that user data somehow was sent to the wrong developer account. Having built APIs before, I can testify that they sometimes do funky things that you don’t expect. Thankfully, in this situation, it seems as though a very small group of people was affected.

 

https://thehackernews.com/2018/09/twitter-direct-message-api.html

Virus Total Like Service Scanning Malware

September 24, 2018 by Sev Shirozian Leave a Comment

So it looks like there was a Virus Total Like service called “Scan4You” that would scan a malicious developers malware to see if it would be able to get past security software/AV providers.  One of the gentlemen behind it was caught and sentence to jail.  But interesting that they are using similar services for the opposite use of what security professionals would use tools like Virus Total for.

 

https://thehackernews.com/2018/09/scan4you-malware-scanner.html

  • « Go to Previous Page
  • Page 1
  • Page 2

Primary Sidebar

Weekly Discussions

  • Uncategorized (14)
  • Week 01: Overview (7)
  • Week 02: TCP/IP and Network Architecture (18)
  • Week 03: Reconnaisance (17)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (17)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (15)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (15)
  • Week 12: Web Services (25)
  • Week 13: Evasion Techniques (8)
  • Week 14: Review of all topics (15)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in