Intel gets green light to continue working with Huawei

Intel has received licenses from US authorities to continue shipping certain products to Huawei, according to a report by Reuters.  In May 2019, US President Donald Trump added Shenzhen-based Huawei Technologies to the US ‘Entity List’, effectively preventing US companies from working with Huawei unless they received a license to do so from the government. Trump … Read more

Germany tightens 5G network security, may informally exclude Huawei

The German government is reportedly planning stricter oversight of telecommunications network vendors. This will make it harder for Shenzhen-based Huawei to hold its place in the German market, whilst stopping short of an outright ban.  Government sources told media that an agreement had been reached to extend scrutiny of the governance and technology of 5G … Read more

A Brief History of UNIX and C

The first UNIX implementation was developed in 1969 (the same year that Linus Torvalds was born) by Ken Thompson at Bell Laboratories, a division of the tele- phone corporation, AT&T. It was written in assembler for a Digital PDP-7 mini- computer. The name UNIX was a pun on MULTICS (Multiplexed Information and Computing Service), the … Read more

Automation, timing and speed, new dimensions of security

One of the spinoffs of the pandemic is the surge in digital services. The security landscape has transited to a new level, thanks to the speed at which digital transactions take place.  Around 95-99 per cent of operations are automated. “Customers need not visit ‘on site.’ Physical documents are on the decline. Matters related to … Read more

AI-ready nations in danger of entrenching inequality

A report from Oxford Insights and the International Development Research Centre (IDRC) has assessed countries on the basis of their AI readiness and responsibility and found that some are at risk of furthering inequality and marginalisation. The ‘Government AI Readiness Index’ in the report ranked the US at number one and the UK at number two … Read more

Evading Firewalls

IP Address Spoofing One effective way an attacker can evade a firewall is to appear as something else, such as a trusted host. Using spoofing to modify address information, the attacker can make the source of an attack appear to come from someplace else rather than the malicious party. Source Routing Using this technique, the … Read more

What’s That Firewall Running?

To determine a type of firewall and even a brand, you can use your experience with port scanning and tools to build information about the firewall your target is running. By identifying certain ports, you can link the results to a specific firewall and from that point determine the type of attack or process to … Read more

Firewall Configurations

Not all firewalls or firewall setups are created equal, so you need to be familiar with each setup and how it works. Firewalls can be set up and arranged in several ways, each offering its own advantages and disadvantages. In this section we’ll cover each method. Bastion Host A bastion host is intended to be … Read more

Firewalls

Firewalls are another protective device for networks that stand in the way of a penetration tester or attacker. Firewalls represent a barrier or logical delineation between two zones or areas of trust. In its simplest form an implementation of a firewall represents the barrier between a private and a public network. When discussing firewalls, it … Read more