Kobold Letters: HTML-based Email Phishing Attacks

Kobold Letters: HTML-based Email Phishing Attacks

Kobold Letters: HTML-based Email Phishing Attacks On March 31st 2024, Luta Security released an article shedding light on a new sophisticated phishing vector, Kobold Letters. Unlike traditional phishing attempts, which rely on deceptive messaging to lure victims into divulging sensitive information, this variant exploits HTML’s flexibility to embed concealed content within emails. Dubbed “coal letters” […]

Google and The Incognito Myth

Google and The Incognito Myth

Google and The Incognito Myth On April 1 2024, Google agreed to settle a lawsuit by destroying billions of data records collected from Incognito mode. The lawsuit alleged that Google was secretly tracking the internet use of people who thought they were browsing privately. Incognito mode is a setting for web browsers that don’t keep […]

MAC Addresses and MAC Spoofing: A Comprehensive Guide

How to spoof MAC Address

MAC Address and MAC Spoofing: A Comprehensive Guide Introduction From facilitating communication to enabling secure connections, MAC addresses play a fundamental role in identifying devices on a network. MAC addresses serve as unique identifiers for every network-enabled device. In this article, we explore the concept of MAC spoofing, and unravel the fundamental principles that underpin […]

White House Issues Warning About Cyber Attacks Targeting US Water Systems

White House Issues Warning About Cyber Attacks Targeting US Water Systems

White House Issues Warning About Cyber Attacks Targeting US Water Systems In a letter released by the White House on the 18th of March, the Environmental Protection Agency and National Security Advisor have warned US state governors about cyber attacks that “have the potential to disrupt the critical lifeline of clean and safe drinking water, […]

Configuring Tor Browser for Maximum Protection

Configuring Tor Browser for Maximum Protection

Configuring Tor Browser for Maximum Protection Introduction Safeguarding your online privacy and security is paramount and one effective tool for achieving this is the Tor browser, renowned for its anonymity features. In this article, we’ll walk you through the process of setting up the Tor browser to ensure maximum privacy and security. https://www.youtube.com/watch?v=Wu7VSRLbWIg&pp=ygUJaGFpbGJ5dGVz Checking for […]

Routing Windows Traffic Through Tor Network

Routing Windows Traffic Through Tor Network

Routing Windows Traffic Through Tor Network Introduction In the era of heightened concerns about online privacy and security, many internet users are seeking ways to enhance their anonymity and protect their data from prying eyes. One effective method to achieve this is by routing your internet traffic through the Tor network. In this article, we’ll […]