
Brute force and time
What is the longest it would take someone to brute force a password based on certain criteria? The worst case for the hacker? I’ve wondered
Join me as I undertake my Masters of Cyber Security
What is the longest it would take someone to brute force a password based on certain criteria? The worst case for the hacker? I’ve wondered
This week we looked at classical ciphers. I enjoyed this, looking at the ingenious ways that clever people have come up with hiding messages in
This week we were challenged to physically destroy some data. I’ve chosen to unshred a document. Not a special document , just some junk mail
The problems with secrets Secrets are interesting. People want to keep secrets, people want to find secrets, people want to share them. They are important
For an activity this we were tasked with finding an example of an insider attack. An insider attack could be carried out by a true
According to The Age, the government is considering making company directors liable for cyber attacks. With cyber crime costing Australia around $3.5 billion a year,
According to The ABC, State-sponsored cyber operations have doubled in the last two years. This is a scary statistic, we hear about the next war
While learning about patterns in security, a recent news story came to mind when scope creep was mentioned -specifically systems and data being created or
I decided to look at the data Facebook holds about me. I was surprised how easy it was to get my information from Facebook and
Introduction Want to know how to protect yourself and limit the damage caused by a cyber attack? The Essential Eight was released by the Australian
© Copyright 2021, Luke Hally