Amnesia:33

week 10: Today, I read about another important topic that is worth my time, which is Amnesia:33. This is a group of 33 security problems found in four types of TCP/IP software that help devices connect to the internet. These are used in many things like smart lights, cameras, and even industrial machines. Found in… Continue reading Amnesia:33

Ripple20

week 9 Today, I learned that Ripple20 is a group of 19 security issues found in Treck TCP/IP software, which is used in many devices such as printers, medical machines, and industrial equipment. These issues had remained hidden for years and were uncovered in 2020. They are dangerous because hackers can exploit them remotely, sometimes… Continue reading Ripple20

Public Wi-Fi

This week 8, I read an article on how to stay safe on public wi-fi. The increasing availability of the internet in nearly all public spaces, including libraries, coffee shops, airports, and shopping centers, makes convenient connectivity more important than ever. However, this connectivity also introduces security risks because public Wi-Fi is not as secure… Continue reading Public Wi-Fi

Week 7

Quantum computing This week, I have been reading about quantum computing and its potential impact on encryption. Many tech professionals are both concerned and fascinated. What is quantum computing? Quantum computing is a technology that uses qubits instead of bits (0,1), and it is becoming more powerful because it can perform multiple tasks simultaneously. Although… Continue reading Week 7

DDS

WEEK 6 This week, I studied Data Distribution Services (DDS). What is DDS? It is a middleware protocol developed by the Object Management Group (OMG), designed for real-time and data-centric communications. DDS enables different systems or devices to communicate effectively without relying on traditional client-server methods. It uses a publish-subscribe model, which means data producers… Continue reading DDS

Mirai Botnet

Week 5 The Mirai Botnet Jun 22, 2025 10:36 PM Today, I read about the Maria Walewska exploitation in IoT devices. I’m surprised how some poeple can do something like this. What they used is a very collective power to millions of devices. It seems to me that they have exploited the weaknesses in the… Continue reading Mirai Botnet

Week 4 Cybercrime

Jun 14, 2025 10:46 PM Today, I read a story about cybercrime on the Kaspersky website. What is cybercrime? And how can you protect yourself? This is the title of the reading. The story’s perspective is that cybercrime occurs for two main reasons. One of these involves individuals or organizations committing cybercrimes using advanced techniques,… Continue reading Week 4 Cybercrime

Week3 First Hacker

Jun 9, 2025 11:09 PM This week, I read about the history of the first hacker. One of the earliest known ethical hackers was René Carmill, a French civil worker during World War II in the 1940s. What interests me about this history is that I never thought the technology was excessive and that what… Continue reading Week3 First Hacker

Week2 Wireshark

Jun 1, 2025 9:47 PM Wireshark plays a significant role in the defensive cyber landscape because it helps protect organizations and individuals from increasing network-based threats. In recent decades, cyberattacks have become more advanced, often violating systems and accessing sensitive information without authorization—sometimes even demanding ransom. Wireshark supports cybersecurity efforts by capturing and analyzing network… Continue reading Week2 Wireshark

Week 1 Cyber

May 26, 2025 7:32 PM According to the Hacker News, one of the most concerning hackers I’ve read about in recent news was reported to have compromised over “70 million npm and Visual Studio Code (VS Code) packages”. These malicious packages were allegedly designed to steal sensitive user data and pose a massive security threat… Continue reading Week 1 Cyber