How to Remove Metadata from a File
How to Remove Metadata from a File Introduction Metadata, often described as “data about data,” is information that provides details about a particular file. It can offer insights into various aspects of the file, such as its creation date, author, location, and more. While metadata serves various purposes, it can also pose privacy and security […]
Bypassing Internet Censorship with TOR
Bypassing Internet Censorship with TOR Introduction In a world where access to information is increasingly regulated, tools like the Tor network have become crucial for maintaining digital freedom. However, in some regions, internet service providers (ISPs) or governmental bodies may actively block access to TOR, hindering users’ ability to bypass censorship. In this article, we’ll […]
Kobold Letters: HTML-based Email Phishing Attacks
Kobold Letters: HTML-based Email Phishing Attacks On March 31st 2024, Luta Security released an article shedding light on a new sophisticated phishing vector, Kobold Letters. Unlike traditional phishing attempts, which rely on deceptive messaging to lure victims into divulging sensitive information, this variant exploits HTML’s flexibility to embed concealed content within emails. Dubbed “coal letters” […]
Google and The Incognito Myth
Google and The Incognito Myth On April 1 2024, Google agreed to settle a lawsuit by destroying billions of data records collected from Incognito mode. The lawsuit alleged that Google was secretly tracking the internet use of people who thought they were browsing privately. Incognito mode is a setting for web browsers that don’t keep […]
MAC Addresses and MAC Spoofing: A Comprehensive Guide
MAC Address and MAC Spoofing: A Comprehensive Guide Introduction From facilitating communication to enabling secure connections, MAC addresses play a fundamental role in identifying devices on a network. MAC addresses serve as unique identifiers for every network-enabled device. In this article, we explore the concept of MAC spoofing, and unravel the fundamental principles that underpin […]
White House Issues Warning About Cyber Attacks Targeting US Water Systems
White House Issues Warning About Cyber Attacks Targeting US Water Systems In a letter released by the White House on the 18th of March, the Environmental Protection Agency and National Security Advisor have warned US state governors about cyber attacks that “have the potential to disrupt the critical lifeline of clean and safe drinking water, […]