Blog

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

We're not going to go into detail about what's going on with Facebook and Cambridge Analytica; there is plenty of information out there about it (see sources at the bottom).  We obviously have huge problems with their approach and we understand that as users we know our data is valuable and collected but to be used and lied to on such a scale is simply unacceptable.  We are hoping to make people aware of the extent of this through their legal right to make a subject access request...

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

One of the annoying things with Windows 10 home is the lack of gpedit or Group Policy Editor.  In this small tutorial, I will show you how you can get this working on Windows 10 Home.  I find it can be useful particularly when demonstrating techniques without employing anti virus evasion techniques.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Wow what an end to the week we have seen!  As you might be aware, on Friday 12th May we all saw the start of what has to be the worlds largest Ransomware attack to date.  Unlike a lot of other attacks, this has been prolific enough to capture the attention of media outlets everywhere, not just covered by the likes of TrendMicro but by more mainstream outlets such as The Guardian.

User Rating: 4 / 5

Star ActiveStar ActiveStar ActiveStar ActiveStar Inactive

In this guide, I'm going to walk you through the process of setting up Kali Rolling on your Raspberry Pi 2, while using an external hard drive / USB falsh drive to contain the root FS.  Why you ask... Becuase the full install of Kali is around 30GB and this means a large micro sd card is required.

User Rating: 5 / 5

Star ActiveStar ActiveStar ActiveStar ActiveStar Active

In a security sense, the term honeypot is used to describe an intentionally vulnerable system with no legitimate use, possibly open to the internet, which is set up for the purpose of both monitoring and detecting potential attacks on the network it is attached to. Keep an eye out for future blog posts where I will show you some of the more interesting logs collected whilst running my honeypots. 

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Reading around in the news today and there seems to be so much more talk concerning the era of IoT devices and how much of a part they appear to be playing in the increase in DDoS attacks against corporations.  This got me thinking, at the moment, there is very little that can be easily done to control things as most people have no idea whatsoever that their devices have been compromised.

About TSSec

We are Digger and Odskee, a small information security research team based in the UK.  We love breaking and fixing things and enjoy getting our hands dirty in the field of infoSec.

Odskee tends to focus on the theoretical, software based aspects while Digger finds himself at home with the raw electronics.  We both have a number of years of experience within a number of similar roles and think these work best as a team.

Latest News

©2018 TSSec

Search