Is Hacking IP Cameras Just for Voyeurs or Does it Have Strategic and National Security Implications?

Welcome back, my aspiring cyberwarriors! Hacking IP cameras has always had a bit of voyeuristic appeal to the aspiring cyberwarrior. Many want to be able to watch people (girlfriends, spouses, and colleagues) without being detected. This is a more basic application of this skill. The higher-level application of these skills concerns the strategic interests of […]

Continue Reading

Chinese State-Sponsored Hackers Inside the US Mobile Telecom System: Mobile Telecom Companies Vulnerable to SS7 Vulnerability

Welcome back, my rookie cyberwarriors!   In recent weeks, a series of sophisticated cyber attacks has once again exposed critical vulnerabilities in the Signaling System 7 (SS7) protocol, a fundamental component of global telecommunications infrastructure that manages call routing, SMS messaging, and cellular network interoperability. These security breaches, detected across multiple major U.S. telecommunications carriers […]

Continue Reading

Mobile Hacking: How the Mexican Drug Cartels Built their Own Cellular Infrastructure to Avoid Surveillance

Welcome back, my aspiring cyberwarriors!   Mobile hacking can take many forms. It can entail any of the following;   (1) a hack against a singular phone such Pegasus and many other IoS and Android malware, (2) an attack against the mobile infrastructure such as SS7 (Chinese hackers have recently compromised the entire US telecom […]

Continue Reading

Cryptography Basics for Hackers, Part 4: Building a Simple Encryption Algorithm in Python

Welcome back, my aspiring cyberwarriors!   Cryptography is one of foundational technologies of cybersecurity. It helps to keep our information safe, secure, and confidential. Without cryptography, anyone could read our messages or our stored data.   In our previous tutorial in Cryptography Basics, I described one of the oldest forms of cryptography, The Caesar Cipher. […]

Continue Reading