Dan Brown
  • Home
  • Blog
  • Twitter
  • LinkedIn

Security Exploit

Articles on new and existing cyber security exploits. Information on  exploit impact, evolution and remediation.

Online Privacy

Lenovo’s Rootkit like Technique to Install Bloatware

Lenovo used a Rootkit like technique to reload bloatware into clean installs of Windows operating systems, leaving customers open to attack. Not long after Lenovo were caught selling computers with SSL hijacking malware pre-installed on them, another breach of their customers trust has been unveiled. Lenovo have been selling computers Read more…

By Dan Brown, 8 years5th May 2015 ago
Security Exploit

BitTorrent Vulnerabilities Exploited for DDoS Attacks

Security Researchers have discovered vulnerabilities in BitTorrent that can be exploited to run powerful Distributed Reflected Denial of Service (DRDoS) attacks that have the potential to bring down parts of the Internet. The research, carried out by Florian Adamsky at City University London, demonstrates how BitTorrent’s open protocols can be Read more…

By Dan Brown, 8 years5th March 2015 ago
  • 14 Essentials Steps to Protect Yourself From Cybercrime
  • Blog
  • Front Page
  • Login Customizer
  • Skills
  • Take Back Control of Your Online Privacy
Hestia | Developed by ThemeIsle