Author: Rajesh Sukumaran

  • Hashing & Data integrity

    Hashing is the process of using a hash function in computing and cryptography that converts data into a fixed-sized string of characters, typically a sequence of letters and numbers.  For example, the operating system on your pc stores passwords as hashes. The operating system uses a hashing function to hash your password and stores it

    Read article →

  • Pass the Hash attack

    A pass-the-hash attack is a cybersecurity attack in which a malicious user steals hashed credentials from a compromised system and uses them to log in as the original user. Hashing is an essential concept in cybersecurity and computer science. It involves using a mathematical algorithm, a hash function, to convert input data into a hash

    Read article →

  • Prevent Screen Capture

    Microsoft is actively rolling out a new security feature in Teams called “Prevent screen Capture”. This will block screenshots and recordings in sensitive meetings. Any screenshot attempts will show a black rectangle over the screen and will not record anything . On Android devices, it will pop up a message that says “Screen capture is

    Read article →

  • Google updates Chrome — fixes around 20 vulnerabilities.

    The latest Chrome version, 142, released by Google on October 28th, includes patches to fix several documented vulnerabilities, some of which are high-severity. The update includes permission to block local network access from public/local websites. Chrome now blocks websites from sending requests to local network devices (like routers, printers, or software running on your machine)

    Read article →

  • Cyber Attack Vectors: What You Need to Know –

    This morning, I received a text from AIB asking me to confirm a money transfer via a link. Panic set in—until I remembered that I don’t even have an AIB account. Another day, another phishing attempt. Cybercriminals are increasingly targeting Irish individuals and businesses with sophisticated scams. These include: Phishing & Smishing Fake emails and

    Read article →