Time is what determines security. With enough time, nothing is unhackable.

Aniekee Ezekiel

Left your keys at the restaurant?

Toyota left their access key in a public GitHub repository for 5 years. That’s right, five years. This code is related to their T-connect service. Here is the article, courtesy of Infosecurity Group Magazine. A couple of thoughts here- this is the result of an error that was made by a contract website development professional. […]

Cybersecurity and Cat Voodoo

You are not prepared. This blog has turned its focus away from the political nightmare that is beyond saving and instead is moving towards cybersecurity and the pursuit of cyber defense. Why Cat Voodoo? Well if you have ever had a cat, you know the voodoo they work whenever they step across your keyboard while […]

Sharkbot Banking Trojan on Google Play

So what does a Trojan do on your phone? Simple- it disguised itself as an antivirus application before it took over your phone and spied on your banking activities and other activities. What’s the software named? It’s an update for the applications “Mr Phone Cleaner” and “Kylhavy Mobile Security”. Not being an android user, I […]

%d bloggers like this: