Blog

Blog

Malware trends in 2018- Ransomware left behind by mining viruses

blog | | Citadelo
This blog is about CoinHive. I will describe how it affects websites, how websites get infected and how to prevent it or how to get rid of it.
Show

Report from 30C3: Forget privacy online!

blog | | Citadelo
Chaos Communication Congress is the oldest hacker conference in the world and the largest of its kind in Europe. It brings current research in the field of security, networking and increasingly also politics and other topics related to “hacking".
Show

MS13-105: Oracle Outside In MDB Parsing Vulnerability – CVE-2013-5791

blog | | Citadelo
People sometimes ask how to know what exact vulnerability was patched in particular piece of closed source software. In this blog, we would like to describe one such example from the Microsoft security bulletin.
Show

How to encrypt emails on Gmail using Mailvelope in Chrome

blog | | Citadelo
Learn how to encrypt your e-mail! We will go through simple installation of free Mailvelope extension to Google Chrome web browser and you will be able to send and receive encrypted messages with other users in no time.
Show

How to enable disk encryption in OS X

blog | | Citadelo
In recent versions of OS X, there is no need to install additional software because disk encryption feature is already embedded in the operating system. Activation and using are simple and straightforward.
Show

How an attacker could get your database using SQL Injection vulnerability (real demo of a hacker attack)

blog | | Citadelo
We will demonstrate a real hacker attack that leads to gaining all the data in the database, including credit card information stored in the web store.
Show