Author Archives: FMTAD

Digital image showing a confused user at a computer surrounded by complex password symbols

Human Limitations in Strong Passwords Creation

Human Limitations in Strong Passwords: Cybersecurity’s Weak Link Passwords are essential for protecting our data on the Internet. But creating a strong password is not easy. It requires a balance between security and usability. In this article, we will explain what entropy is and how it measures the strength of a password. We will also […]

SSH handshake with Terrapin attack and EviKey NFC HSM

Terrapin attack: How to Protect Yourself from this New Threat to SSH Security

Protect Yourself from the Terrapin Attack: Shield Your SSH Security with Proven Strategies SSH is a widely used protocol for secure communication over the internet. It allows you to remotely access and control servers, transfer files, and encrypt data. However, SSH is not immune to attacks, and a recent vulnerability OpenSSH before 9.6 (CVE-2023-48795) has exposed […]

Telegram and the information war in Ukraine

Telegram and the Information War in Ukraine

How Telegram Influences the Conflict between Russia and Ukraine Telegram and the information war in Ukraine are closely related. Telegram is a messaging app that offers users a secure and confidential way to communicate, thanks to its end-to-end encryption system. It has a large user base around the world, especially in Eastern Europe, where it […]

Kismet iPhone: How to protect your device from the most sophisticated spying attack?

Kismet iPhone: How to protect your device from the most sophisticated spying attack using Pegasus spyware Do you own an iPhone? Do you think it is safe and private? You might be wrong. Hackers have created a clever attack called Kismet iPhone that can infect your device with Pegasus, the world’s most powerful spyware, without […]

5Ghoul: 5G NR Attacks on Mobile Devices

5Ghoul: 5G NR Attacks on Mobile Devices

5Ghoul: How Contactless Encryption Can Secure Your 5G Communications from Modem Attacks 5Ghoul is a set of 5G NR vulnerabilities that affect Qualcomm and MediaTek modems. These flaws allow to launch denial-of-service attacks or degrade the quality of the 5G network. What is 5Ghoul? 5Ghoul is a set of 14 5G NR (New Radio) vulnerabilities, […]

The American Intelligence How It Works : Section 702

The American Intelligence: How It Works

The American Intelligence: How It Works, Its Limits and Consequences The American intelligence is one of the most powerful and influential in the world. It has a vast network of agencies, resources, and allies that enable it to collect, analyze, and act on information of strategic interest. However, the American intelligence also faces challenges and […]

New EU Data Protection Regulation 2023/2854: What you need to know

New EU Data Protection Regulation 2023/2854: What you need to know

What you need to know about the new EU data protection regulation (2023/2854) Personal data is a valuable asset in the digital age, but also a vulnerable asset. This is why the European Union has adopted a new regulation to protect the personal data of individuals in the EU. Data Protection Regulation (EU) 2023/2854 supplements […]

Ledger Security Breaches from 2017 to 2023: How to Protect Yourself from Hackers

Ledger Security Breaches from 2017 to 2023: How to Protect Yourself from Hackers

Ledger Security Breaches from 2017 to 2023: How to Protect Your Cryptocurrencies from Hackers Have you ever wondered how safe your cryptocurrencies are? If you are using a Ledger device, you might think that you are protected from hackers and thieves. Ledger is a French company that specializes in cryptocurrency security. It offers devices that […]

LitterDrifter A USB Worm for Cyberespionage

LitterDrifter: A USB Worm for Cyberespionage

LitterDrifter: A USB Worm for Cyberespionage and Its Threats to Data Security LitterDrifter is a computer worm that spreads through USB drives and is utilized by a Russian cyber espionage group known as Gamaredon. This group, active since at least 2013, primarily targets Ukraine but has also infected systems in other countries. LitterDrifter enables Gamaredon […]