Monday, December 04, 2017
Many years ago I happened to purchase one of these Motorola Xooms from a Vodafone outlet with the prospect of using it to learn Android development. Of course the Android store was becoming full of great applications, and my Hello World alternatives were not going to cut the mustard when it came to competitive use. So eventually this tablet went into a box, moved house a few times, and has now reappeared on my desk whilst I am in the midst of studying Hacking Countermeasures. What follows can only be described as 'To be expected'.
Monday, March 12, 2018
Ransomware is not a new concept and has been previously filed under the category of annoyances. But in recent years with the advent of the Dark Web (Onion Routing protocols) and Blockchain powered decentralised currencies, they are becoming extremely potent and detrimental to business operations. To better understand how ransomware is built and targeted it is important to understand how malware is created, marketed, and operated. This understanding will hopefully allow the intended targets (or would be victims) to understand their place in the malware / ransomware threat eco-system.