Entries by Evan Youngman

Virtual Machines and The Cloud

Cloud-based services have grown to monopolize some segments of the tech fields. In many cases, it is simply more economically feasible to go to companies like Amazon and make use of their distributed computational infrastructure than to purchase and run servers on location. Here we will look at some of the options available, and what […]

PKI (Public Key Infrastructure) and LDAPv2

Public Key Infrastructure (PKI) is the set of standards and methods required to manage the process of generating digital certificates and creating cryptographic methods of communication between parties. PKI allows for information to be securely moved through networks and is used in a vast array of network based activities. Essentially, a public key is provided by […]

Ransomware: Present and Future

Modern ransomware is a form of cryptomalware which encrypts the contents of the target hard drive and potentially all storage media on a network and then demands payment for decryption. This is accomplished through traditional threat vectors to lead a user to execute the malware and begin encryption. After infection and execution of any number […]

Cryptojacking Attack Infects Thousands of ISP-Grade Routers

Cryptomining attack scripts, sometimes referred to as cryptojacking, are a subtle form of malware designed to harness the power of your CPU to mine cryptocurrency for those who develop them. These malware can be spread through infected files and the usual vectors of transmission. Cryptomining can also take place with our without your tacet consent […]