I wrote some simple malware to steal credit card data and how that connects to a Texas data breach

OK it was part of my Master course, and it was an attack against a sand-boxed compromised server, and the malware, to be honest, would not last a moment in the real world with the current state of the art when it comes to protecting customer payment information. However the …

VMWare is a real cyber security issue – fix it or get rid of it CISA warns

This is pretty simple – do you use VMWare if so get it patched or change it. The Spring Cloud framework vulnerability is proving a honey pot for attackers. CISA issues directive for exploited VMware bug after IR team deployed to ‘large’ org – The Record by Recorded Future Patch …

Research that shows it is possible to hack an iPhone when it is turned off and drive off in your Tesla – UPDATED 18 May 2022 with real world examples of Bluetooth vulnerabilities

This is theoretical research that shows it may be possible to run malware on an iPhone that is still active even when the phone is powered off, by abusing a lack of authentication in the Bluetooth system and the fact that the Bluetooth is used in the Apple “find my…” …