Posts

How DoS Attack Effects on Any End Device: A Step-by-Step Lab by Aden Hawsh

Image
                        DoS Attack on an End-Device   The Internet of Things (IoT) has become a favourable arena for bot herders to carry out distributed denial-of-service attacks. IoT devices are notorious for their inherent security vulnerabilities, with some being obsolete and unpatched for extended periods. In addition, some manufacturers may have ceased operations, but their devices remain operational and connected to many other IoT devices, such as CCT home cameras, which are attractive targets for cybercriminals. This permits bot herders to construct their cyber armies and initiate devastating DDoS attacks (Bertino and Islam, 2017) .   Compromised home IoT devices allow bot herders to initiate attacks by flooding target servers or networks with traffic. Criminals may use basic computers or devices to send massive ICMP packets, resulting in temporary or permanent loss of service. In c...

Navigating the Digital Future: The Critical Path from DNS to DoH for Enhanced Privacy and Security in the UK, Aden Hawsh

Image
      As the digital landscape continues to evolve at a rapid pace, the transition from the traditional Domain Name System (DNS) to DNS over HTTPS (DoH) emerges as a pivotal development in the quest for enhanced internet privacy and security. Globally, this shift is recognized as a significant step forward. However, in the UK, the journey towards adopting DoH is still underway, presenting a unique set of challenges and opportunities for UK residents. This blog delves into the essence of DoH, its global significance, the reasons behind its delayed adoption in the UK, and the critical importance of embracing this technology for a safer digital future.   The Global Shift to DoH: A Leap Towards Secure Browsing   DNS has been the internet's backbone for decades, translating user-friendly domain names into IP addresses. Traditionally, DNS queries are sent in plain text, making them vulnerable to interception and manipulation. Enter DNS over ...

Understanding the Threat of Evil Twin Attacks on Home Networks , Lab Step by Step . By Aden Hawsh

Image
Understanding the Threat of Evil Twin Attacks on Home Networks   An Evil Twin attack is a common cyberattack in which a hacker sets up a rogue Wi-Fi access point that looks and acts like a real network in order to trick gullible people into connecting to it rather than the real one under the false impression that it is secure. Once connected, the attacker can access the victim's data and obtain private information like credit card numbers, login passwords, and private messages.   This kind of attack is common in public places like cafes, airports, and hotels since it takes advantage of people's faith in well-known Wi-Fi networks and needs little equipment. It can, however, also target people at home, highlighting the significance of caution and network security procedures for all internet users. It is essential to comprehend how Evil Twin attacks work and how to reduce the dangers associated with them in order to safeguard oneself against potential cyber threats. The Evil Twin...