Showing posts from January, 2020

Online Sextortion and Malware

Introduction I have written about online sextortion so I will not be going into explanations about it. What this post aim is to highlight an upcoming trend and what may be a future wave of online sextortion attacks. This links to spam emails by aiming to take advantage of human behaviour to extort money usually some form of cryptocurrency from a victim. These are derived from social engineering and phishing attacks. But now Sextortion, Malware and Spam are being used together. Unhappily for a French ISP's users, online crooks combined all three in a hideous attempt to extort cash with custom malware that records their on-screen doings, according to infosec researchers. In a curious evolution of online attempts to scam people, the Varenyky malware being tracked by Slovakian anti-malware company ESET briefly included a screen-recording feature that scanned for particular pornography-related terms before recording what was on screen. ESET's described how the malware "was

Personal Interest - Mummification in Bronze Age Britain

Introduction Whenever mummies are mentioned, our imaginations stray to the dusty tombs and gilded relics of ancient Egyptian burial sites. With their eerily lifelike repose, the preserved bodies of ancient Pharaohs like  Hatshepsut and Tutankhamen  stir our imaginations and stoke our interest in people and cultures which have long since passed away.  But the Ancient Egyptians weren’t the only ones to mummify their dead. As it happens, mummies dating back to the Bronze Age – between 4,200 and 2,700 years ago – have also been discovered in Britain. But until recently, we knew very little about how mummification was practised by ancient British societies, or to what extent.  Mummification may have been more common in Bronze Age Britain than previously believed, and the ancient Britons may have purposefully mummified their dead with unknown funerary rituals—but  reasons  why and the exact practises carried out still eludes archaeologists. Practises This evidence says to research

Potential Trends and Threats in Cybersecurity For 2020

Introduction Most  of the elements listed here are continuations and evolutions of previous threats and patterns of attack that the cybersecurity industry faced previously. For 2020 there are the " Known " the trends and threats. The K nown-Unknown things that are expected in 2020 but have will unknown effects and repercussions. Finally, the Unknown-Unknown things which we cannot talk about or prepare for because they will come about out of the blue. Though we can speculate that some new type of malware  or DDOS attack may come about or even an attack using quantum computing may appear. The trends and threats are listed in particular order. Trends and Threats 5G & the IoT -  5G will make the IoT a reality. This interconnected network of internet-enabled devices already exists. However, its potential is limited by the slow speeds of 4G wireless. The ultra-fast 5G network will allow these devices to transfer exponentially more information with download speeds of up t