In this new blog update I discuss the overall security when it comes to Wifi hacking and if threat actors get connected to your network what could they see? It will also demonstrate a Man in the Middle (MITM) attack as well how injecting javascript during the MITM attack can internall redirect users to phsihing pages to steal credentials. Tested on iPhone 15 (this can apply to any phone or computer on a network)
Read MoreIn this blog post, I discuss the importance of Hard drive encryption with practical steps that can be implemented in a real-world scenario to deploy malware on a user's computer and disable windows defender permanently for permanent persistence.
Read MoreWelcome to my blog! My main goal is to provide valuable information and knowledge about information security to my readers. With the ever-increasing amount of digital information and the rise of cyber threats, it has become essential to have a basic understanding of information security. Through my blog, I aim to educate and teach my readers about the latest trends, best practices, and techniques to enhance their information security knowledge. In addition to sharing information, This is my pre blog post before i add real dedicated pages for every blog post.I will also be publishing my own work and research in the field of information security. My hope is that my blog will serve as a platform for open discussion, sharing ideas and experiences, and ultimately help my readers to protect their digital assets. If you would like to know more about me, please check the top right-hand corner for the 'About Me' section. Thank you for visiting, and I hope you find my blog informative and engaging!.