Posts tagged on Analysis

Unveiling the Anonymous Author: Stylometry Techniques

– One of the techniques that fascinates me most about writing is textual analysis, which includes semantics (the meaning of words) and syntax (the use of signs and letters to construct sentences). Throughout history, both classical and modern, there are numerous examples of authors who wanted to keep … Read Full Article

Unveiling the Anonymous Author: Stylometry Techniques Illustration

Analyzing the Mario Themed Malware

– If you were a child with a Nintendo DS like myself, growing up you will undoubtedly have played (for countless hours) video games from the Mario series. Appearing for the first time in “Donkey Kong”, Mario is the undisputed protagonist of the video game brand of the Nintendo development … Read Full Article

Analyzing the Mario Themed Malware Illustration

How to React to the Ledger Data Breach: 5 Recommendations

– If you think you are amongst the users affected by the latest Ledger data breach, it is important not to panic! Follow a few simple steps and you can check the extent of the damage and keep an eye on the security of your account. What are Data Breaches? One of the unfortunate side effects of the … Read Full Article

How to React to the Ledger Data Breach: 5 Recommendations Illustration

A Practical Analysis of the Ledger Phishing Email

– Attempts at phishing and social engineering attacks have increased exponentially as of late, especially towards users who are active in the cryptocurrency space. Recently, there has been much discussion about a cunning attempt by phishers against Ledger and its users. In this article, we’ll … Read Full Article

A Practical Analysis of the Ledger Phishing Email Illustration

The Myth of Privacy and End-to-End Encryption in Zoom

– Zoom is a service to host meetings without the need to install and configure complicated applications: it is one of the many solutions for those who, during quarantine, want to keep in touch with friends and relatives. In this last period of lockdown, Zoom is becoming popular because of how simple … Read Full Article

The Myth of Privacy and End-to-End Encryption in Zoom Illustration

Take off the Infrastructure of a Scammer: Cryptonder and Torowallet

– On a rainy autumn day, I was contacted like many users by a suspicious individual on Telegram. He insisted on asking for the help of the user who had to recover his wallet which contained several bitcoins. Our “friend”, hencereferred as “M.”, insisted that the user has to … Read Full Article

Take off the Infrastructure of a Scammer: Cryptonder and Torowallet Illustration

Monero Windows and Linux CLI Compromised: The Analysis of Binaries

– As mentioned in the getmonero.org blog post, the binaries of Command Line Interface (CLI) of Monero were recently compromised. For readers who are unaware of Monero, it is a cryptocurrency which aims to protect the financial privacy of its users. It is based on well-known technologies such as ring … Read Full Article

Monero Windows and Linux CLI Compromised: The Analysis of Binaries Illustration

Unpacking ASIC firmware: AntMiner Exploited

– Introduction Experts say cryptocurrencies (such as Bitcoin, Monero, and Ethereum) will be the protagonists of the future decentralized and distributed economic system. If this is true then one of the most debated topics in the field of cryptocurrency, how to verify payments while spending as little … Read Full Article

Unpacking ASIC firmware: AntMiner Exploited Illustration

Botnet analysis based on IRC network

– With one of my many honeypots actived around the world wide web, I discovered an interesting script written with the famous Perl programming language. This Perl script is a malware used to remotely control a machine, opening what is technically called backdoor. If this malicious program runs on … Read Full Article

MyMonero Phishing – Reversing the fake Android app

– I was surfing on Reddit quietly in a sunny day. I was busy since I had to work for many projects including Mastering Monero. At one point, I notice a new user thread asking if there ever was a MyMonero app for Android. First of all, MyMonero is a private business founded by fluffypony who is the … Read Full Article

MyMonero Phishing – Reversing the fake Android app Illustration

MEGA Chrome Extension Hacked - Detailed Timeline of Events

– TLDR; On 4 September at 14:30 UTC, an unknown attacker managed to hack into MEGA’s Google Chrome web store account and upload a malicious version 3.39.4 of an extension to the web store, according to a blog post published by the company. Upon installation or auto-update, the malicious … Read Full Article

MEGA Chrome Extension Hacked - Detailed Timeline of Events Illustration

Introduction to MoneroV and its Inherent Risks

– The “MoneroV” coin is an impending unofficial fork of the Monero blockchain with many “red flag” characteristics that have alarmed the Monero community. Many users are wondering: could the MoneroV fork be a scam project? This article discusses risks for individuals claiming MoneroV, and describes … Read Full Article

Introduction to MoneroV and its Inherent Risks Illustration

How to Crash the iPhone with a Single Telugu Character

– In recent years, Apple has been heavily criticized for the security implications of their market centralization and policy of irreversible operating system updates. Mobile device users are strongly pressured to install packaged iOS upgrades that cannot be rolled back. While this practice greatly … Read Full Article

How to Crash the iPhone with a Single Telugu Character Illustration

All tags