Brute force attacks

I have been running into the term “brute-force attacks” quite a lot during my journey into cybersecurity. Brute-force attacks are used when you want to crack someone’s password to obtain unauthorized access. I understand what they do but I never invested a lot of time in getting a full grasp of how brute-force attacks work. 

(more…)

0 Comments

Using KeePass Part 1 -setting up a password database

I have been postponing the installation of a decent password manager on my computer for quite a while now. The main reason is that I didn’t really see it as a key priority and installing the one I selected, KeePass can be a bit of a hassle to set up. I think it’s more about procrastination than “priorities” in the end so I decided to stop all the presses related to other stuff and to set up

(more…)

0 Comments

The T-Mobile Data Breach and Phone Scamming

A few days ago, news stories appeared about a huge data breach that occurred at T-Mobile. The first reports of last Sunday stated that someone on the dark web was claiming to have the data of 100 million US subscribers/ex-subscribers from T-Mobile servers and was selling a portion of it on an underground forum for 6 bitcoin which is over 220K€. The information that was stolen didn’t only include names, phone numbers and physical addresses but also social security numbers, driver’s license information and IMEI numbers (a unique phone device number you can see as a sort of phone’s social security number).

(more…)

0 Comments