Blog

User Rating: 5 / 5

Star ActiveStar ActiveStar ActiveStar ActiveStar Active

In a security sense, the term honeypot is used to describe an intentionally vulnerable system with no legitimate use, possibly open to the internet, which is set up for the purpose of both monitoring and detecting potential attacks on the network it is attached to. Keep an eye out for future blog posts where I will show you some of the more interesting logs collected whilst running my honeypots. 

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Reading around in the news today and there seems to be so much more talk concerning the era of IoT devices and how much of a part they appear to be playing in the increase in DDoS attacks against corporations.  This got me thinking, at the moment, there is very little that can be easily done to control things as most people have no idea whatsoever that their devices have been compromised.

About TSSec

We are Digger and Odskee, a small information security research team based in the UK.  We love breaking and fixing things and enjoy getting our hands dirty in the field of infoSec.

Odskee tends to focus on the theoretical, software based aspects while Digger finds himself at home with the raw electronics.  We both have a number of years of experience within a number of similar roles and think these work best as a team.

Latest News

©2018 TSSec

Search