A few years ago I collected materials for the Winamp Skin Museum, and some of the files seemed damaged to me. I decided to explore them, and it turned out, that in fact these skins are just zip files with a different extension. What will happen, if you extract these files? Read More …
The Rise and Fall of Yahoo! Messenger
Yahoo! Messenger was one of the first text messaging apps on the Internet. He made a real revolution in communication, offering users a convenient alternative to telephone conversations and email correspondence. Let's talk, how it appeared and why it could not compete with Read More …
RGB-TEAM “basin” data from PJSC Gazprom
An archive with data from PJSC Gazprom has appeared on the hacktivist website RGB-TEAM. The archive contains three files of ~12 MB: Monitor data relevance, at the moment it is not possible. Because. the archive appeared recently and there is practically no analysis data. The account still contains Read More …
RanSim review and quick tests.
RanSim is a tool, which simulates ransomware attacks, to check, How your threat protection software responds to real attacks. You can use RanSim, To make sure, that your software blocks ransomware or can detect false positives . This tool simulates Read More …
How a hacker and an insider were caught at the World Bank
We continue surfing the web in search of cool cybersecurity stories. And today - an instructive story about, as Amelie Coran (Amelie Koran on her website) I caught a hacker with almost my bare hands, attacking World Bank server, as well as an insider, who tried to play on this story. Having neutralized Read More …
Digital detective cheat sheets.
Digital forensics – it's an identification process, conservation, extraction, data analysis and presentation, that have been processed electronically and stored on digital devices. This data, known as digital artifacts, can be found in computers and smartphones and may play a key role in Read More …
How to decrypt files after Lockbit 3.0 Ransomware
LockBit ransomware infrastructure has been hijacked 20.02.2024 After that, how its dark web leak sites were taken down Monday in a global law enforcement operation codenamed Operation Cronos, which began several months ago and was carried out by the National Agency for the Fight against Read More …
Windows XP: puzzle title.wma
Old operating systems and applications can still surprise. Every file sometimes hides a whole story.. Who is the real author of the Pinball Space Cadet demo game and is it true Bliss desktop wallpaper ("Serenity") were filmed in Sonoma County, State of California? Similar Read More …
Browser war. Netscape
The Internet is an amazing invention of mankind, and we're used to it, that it is also free. Yes, Certainly, we all pay to connect, creation and maintenance of websites, but Internet surfing itself never demanded money from us, and Internet access via browsers Read More …
Where to store secret files?
All human information can be divided according to importance, like that: Losing files is always unpleasant. That's why we make backups. But the degree to which information security efforts are paranoid depends on the importance. There is a file category, which cannot be lost under any circumstances, even in case of BP. Read More …