Discussion on Information Security Awareness During Cybersecurity Week: Wi-Fi Security

Discussion on Information Security Awareness During Cybersecurity Week Wi-Fi Security 01 Phishing Wi-Fi Risk Analysis In public places such as restaurants, shopping malls, train stations, and airports, free Wi-Fi hotspots are often deployed. However, attackers may create deceptive Wi-Fi hotspots. Once connected to these malicious hotspots, users may face risks such as information leakage and … Read more

Discussion on Information Security Awareness During Cybersecurity Week: Wi-Fi Security

Discussion on Information Security Awareness During Cybersecurity Week: Wi-Fi Security

Discussion on Information Security Awareness During Cybersecurity Week Wi-Fi Security 01 Phishing Wi-Fi Risk Analysis In public places such as restaurants, shopping malls, train stations, and airports, free Wi-Fi hotspots are often deployed. However, attackers may create misleading Wi-Fi hotspots. Once connected to these malicious hotspots, users may face risks such as information leakage and … Read more

Introduction to Popular Ransomware Encryption Algorithms

Introduction to Popular Ransomware Encryption Algorithms

Ransomware is a new type of virus trojan that has emerged alongside the rise of digital currencies. It typically spreads through various forms such as brute force cracking, exploiting vulnerabilities, spam emails, and bundled software. Once a machine is attacked by ransomware, most files will be modified by encryption algorithms and have a special suffix … Read more

Enhancing Router Security for Remote Access with LEDE/OpenWRT

Enhancing Router Security for Remote Access with LEDE/OpenWRT

In the previous two articles, Blue Dot Network introduced how to configure DDNS to bind a custom domain name for public remote access on LEDE/OpenWRT firmware routers. Additionally, a trusted certificate can be bound to the custom domain name for HTTPS access. Blue Dot Network will also introduce how to configure IPv6 for public access … Read more