• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.001 ■ Fall 2019 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Jiahao Karl Li

Macy’s suffers online Magecart card-skimming attack, data breach

November 21, 2019 by Jiahao Karl Li Leave a Comment

Macy’s has announced a data breach caused by Magecart card-skimming code being implanted in the firm’s online payment portal. The code injection, believed to have been done on October 7, impacted the Macy’s checkout page and wallet page, the latter of which is accessed through the “My Account” facility. The amounts of customers may have been embroiled in the data-stealing campaign is still under water, which lasted at least a week before Macy’s knew of its compromise. However, a Macy’s spokesperson suggests that only a “small” number of customers were involved, and they would be offered consumer protection services for free.

 

www.zdnet.com

Filed Under: Week 13: WPA2 Enterprise and Beyond WiFi Tagged With:

Apple locks top secret-spiller out of his developer account

November 21, 2019 by Jiahao Karl Li Leave a Comment

Apple’s PR team has yet replied to the media about why Guilherme Rambo’s account remains locked. Previous, Apple took serious steps towards leaks and rumor mongers in 2007 against reporter Nick Ciarelli and in 2010 against Gizmodo.

 

cultofmac.com

Filed Under: Week 13: WPA2 Enterprise and Beyond WiFi Tagged With:

Windows & Linux get options to disable Intel TSX to prevent Zombieload v2 attacks

November 14, 2019 by Jiahao Karl Li Leave a Comment

A new vulnerabilities discovered earlier this week implied that companies’ CPUs are exposing to potential attacks from Zombiload. According to Intel, companies have the options to disable the updates to prevent the risk, but also need to make sure the system are away from impact and performance slow down.

 

ZDNET.com

Filed Under: Uncategorized Tagged With:

Instagram tests hiding Like counts globally

November 14, 2019 by Jiahao Karl Li Leave a Comment

Instagram is testing a new option to hide the “like” counts from the public and only available to the post owner self. The user can decide whether they wanna receive public’s opinion of the post. Social Media’s new attempt to put humanity in front of technology? My questions would be, why not just having a “like” function without any amounts collecting?

 

techcrunch.com

Filed Under: Week 12: Introduction to Wireless Security with WEP and WPA2 PSK Tagged With:

Chronicle, Google’s moonshot cybersecurity startup that was supposed to completely change the industry, is imploding

November 7, 2019 by Jiahao Karl Li Leave a Comment

Chronicle Is Dead and Google Killed It

Alphabet announced, in early 2018, their new start-up that helps business to realize their data security. The moonshot project involved machine learning technology and security telemetry data about known malware and internet infrastructure. Not long, one and half year, after the breaking announcement, however, Chronicle has been thrown back to Google’s cloud department and reports of management flaws and staff leaving started appearing.

Vice.com

 

Filed Under: Week 11: Intro to Dark Web and Intro to Cloud Tagged With:

ACLU sues FBI, DOJ over facial-recognition technology, criticizing ‘unprecedented’ surveillance and secrecy

October 31, 2019 by Jiahao Karl Li Leave a Comment

ACLU sues FBI, DOJ over facial-recognition technology, criticizing ‘unprecedented’ surveillance and secrecy

The reports talked about the the American Civil Liberties Union (ACLU) suing the Department of Justice, the FBI and the Drug Enforcement Administration the usage of facial-recognition software, and arguing in a detailed records that Americans’ civil rights and privacy were threaten by their use of the secretly implemented a nationwide surveillance technology.

 

The Washington Post

Filed Under: Week 10: SecuritySheperd Tagged With:

Avast, NordVPN Breaches Tied to Phantom User Accounts

October 24, 2019 by Jiahao Karl Li Leave a Comment

Attackers are using forgotten or unknown user accounts with little more than a password to gain remote access to the internal system of Avast, antivirus and security giant, and NordVPN, virtual private networking (VPN) software provider. Both companies disclosed details about the month-long, from May to August, intrusion today.

krebsonsecurity.com

 

 

Filed Under: Week 09: Web Application Hacking Tagged With:

Google expands Chrome’s Site Isolation feature to Android users

October 17, 2019 by Jiahao Karl Li Leave a Comment

I am not an android user but it is interesting to know that some methods were taken to prevent cross-sit scripting. Tech company started to focus on mobile device security more nowadays, because mobile device is more portable and versatile, which is convenient to the customers but, at the same time, makes them more vulnerable to and brings more angle of flaws to attackers. When using incognito and private mode is not enough to protect PII of customer, more isolated solution should be implemented to build barriers.

zdnet.com

Filed Under: Week 08: Malware Tagged With:

Pinterest says AI reduced reported self-harm content by 88%

October 10, 2019 by Jiahao Karl Li Leave a Comment

“Pinterest says it’s using machine learning techniques to identify and hide content that displays, rationalizes, or encourages self-injury. The company says it has achieved an 88% reduction in reports of self-harm content by users and that it’s now able to remove such content 3 times faster.”

Social media plays a big role in raising awareness of mental health. It is important to make use of it to prevent cyber bullying and personal attack instead of encouraging negative influence.

VentureBeat Article 

Filed Under: Week 07: Social Engineering Tagged With:

Microsoft Is Still Rattled Over U.S. ‘Sneak-and-Peek’ Searches

September 26, 2019 by Jiahao Karl Li Leave a Comment

The article reviewed the battle between Microsoft and the U.S. Government since 2016 about disclosing “secrecy order” from government’s demand to obtain data from Microsoft’s customers. Microsoft is attempting to challenge the federal orders to retain its discipline towards customers’ privacy. In the case of 2016, the U.S. government was investigating a money fraud associated to two email account. Microsoft stopped the them before they moved forwards to obtain orders from the federal judges, as stated by the Dev Stahlkopf, Microsoft’s general counsel.

 

https://www.bloomberg.com/news/articles/2019-09-25/microsoft-is-still-rattled-over-u-s-sneak-and-peek-searches

Filed Under: Uncategorized Tagged With:

  • Page 1
  • Page 2
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (55)
  • Week 01: Overview (6)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (7)
  • Week 04: Network Mapping and Vulnerability Scanning (4)
  • Week 05: Metasploit (9)
  • Week 06: More Metasploit (8)
  • Week 07: Social Engineering (11)
  • Week 08: Malware (19)
  • Week 09: Web Application Hacking (14)
  • Week 10: SecuritySheperd (12)
  • Week 11: Intro to Dark Web and Intro to Cloud (10)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (6)
  • Week 13: WPA2 Enterprise and Beyond WiFi (11)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (9)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in