Home Remote Services Services About Terms Blogs
Ransomeware Attack
Cyber Attack
Man in the Middle Attack



My Cyber Security Articles

Understanding Log4j Vulnerability Through Concept and Structure
read more...

This whitepaper concentrate on understanding the concept of log4j in context of its' vulnerability.

MOBILE DEVICES AND THE SECURITY RISK TO BUSINESSES
read more...

So what happens when your phone works overtime and suddenly become deformed?

Banking Malware
read more

Ever thought your the banking transaction from your mobile device was risky. Here's how...




Archives

Trustjacking
January 12, 2019

Trustjacking was developed to disrupt one's "Trust" and create a vulnerability in mobile devices. Crippling devices and leaving them in an exploitable state. ... Mobile devices have become a sacred object in today's age. Our phones hold important contacts, dates, personal/business notes, email accounts, social media, bank accounts, you name it. So, when plugging in your mobile device into an outlet to charge or sync your settings for playback on an external device is today's norm. Many of us have chosen to "trust" external charging objects to charge or interact with our mobile device. Which leads to why we must be more careful with what and where we "trust" to charge or sync our devices.Trustjacking has wrecked our ability to freely charge and sync devices to public USB stations. Apple users iTunes are at risk each time we "trust" an unknown USB source. Immediately after accepting the popup message, "Do you trust this device...", devices are capable of being compromised.

Majority of individuals select the option to "Trust" the associated device to USB station. Once access is granted malware downloads to your device. After download is completed and malware become active the attacker patiently wait for iTunes to sync with phone and intercept login credentials. Gaining your

login credentials to iTunes, grant admin rights to your device and allow the attacker to monitor your device activty.

Trustjacking differentiate itself from other known "jacking" malware, by its ability to remain associated with your device, even after you unplug. Once an attacker establishes access, they are able to maneuver in iTunes and install programs at will. Access to information include backups, pictures, iMessages, App data, etc., which contain our personal and sacred information. This malware is powerful enough to replace apps with modified versions feeding your interactions back to the attacker. Access to backups allow the attacker to maneuver into the database of an iOS device and have direct control of the device.

Trustjacking is serious and easy to fall victim too. If there's any consolation two things must occur before Trustjacking is able to infect your iOS. First, WIFI must be enabled and two, the user must select to "Trust" the USB source. Best defense is to refrain from using public charging stations. Be sure your personal computer is not infected with malware which can transfer to your mobile iPhone if connect via USB. Always remember my quote, "What's free may just not cost you right now."




"Loapi Malware" Deforms Android Device
January 18,2018

Android Malware What happens when your phone works overtime and suddenly become deformed? That's exactly what may happen when "Loapi Malware" attacks your Android mobile device. This strand of malware can be found in the latest mobile malware disguising itself in the form of reocurring advertisements. Loapi Malware is designed to constantly change its strategy and techniques to attack various devices. Loapi may appear in various ways including but not limited to:

Loapi Malware is well developed and designed to cause major disfunction to infected devices. Various researchers discovered consistency in an overload to the processor (caused from excessive traffic), resulting in the battery bulging from its existing case.
Click to learn more about Loapi Malware



GhostCtrl
July 22,2017

Well I guess it true! Your conversation on the phone is not always private. Android has been exposed to one of the most unpleasant virus spying tools on the market. Its name says all! GhostCtrl has been achilles heel to one of the most effective means of communication. It has the ability to record audio (using built-in microphone) and video (using the camera) then transmit information to hackers has made a world of trouble for mobile users. If thats not enough, how about its ability to lock your mobile device by resetting the PIN code and displaying a ransom note. I guess paying for long distance phone calls is not obsolete yet. This is just a chisel off the iceberg to the trouble it can cause.

GhostCtrl was discovered by Trend Micro, while being used as an attack against Israeli healthcare organization. Once again the primary target seemed to be Windows computer with RETADUP, a combination of a worm, infostealer, and backdoor trojan. Its primary attack is against healthcare organizations.

So far the best fight against GhostCtrl is to keep your mobile devices up to date, and never download an app untrusted.

Ghost

GOOGLE SEARCH DOES WHAT!!
July 22,2017

Have you ever wondered how or why google can find so much information on your personal life? Have you ever wished you can have it removed? Good NEWS, now you CAN!!! Google will honor your request to have personal medical records, social security/national identification numbers, bank account or credit card numbers, images of signatures, and nude or sexually explicit images removed from google search. Read more to find out how!
GOOGLE SEARCH

Ransomware



Cyber Interview



WilcomputeIT and Mr. Rogdric S.




About The Author
June 14, 2017

March 12, 2022 - updated



Ron Wilson aka "Unfamilia" is who I am. Earned my Bachelor of Science in Engineering and Mastes's in Information Systems Security. With dreams comes responsibility. With no directions chaos is present. This opportunity to work and research in the space of cyber security was built from dreams and consistent pursuit of molding chaos into triumph. In Ralph Waldo Emerson poem he references traveling the road less taken and leaving a path. He never said the journey would lead to immediate success. But he did say leave a path. This is my path I'm leaving. The world of computers, network and now cyber security is my path. I don't look for immediate success, triumph or perfection. However, I pursue my dream with expectation of experiencing each one of these phases of life.

As a young gamer I gamed with a clan who chose the name [SICC]. From jump I gravitated towards what this name represented. In respect of the founder, I won't unveil its meaning. As we participated and hosted many quake matches, I inadvertently discovered a passion for computers. With no dividends to purchase my own, my mothers sacrifice to fulfill my estrange request of a computer became the spark to my dream. Even today we put aside a day or two out the year to quake against some of the clan members.

My direction to Cyber Security was not discovered until after my third year of being in IT. The challenge presented a future for me. It was not something I understood or had exposure too. I was simply challenged by my same childhood friend to get into the future. With no direction and a chaotic beginning, I found my way back to school to earn my Masters in Information Security. With a solid foundation in computers and networking, I begin working and researcing Cyber Security. Each experience in my jouney has contributed to defining and cultivating my profession in Security Engineering and research. Never taking it for grant it, God has truely molded my life to be a contribution to our society.

The beginning of my career was frusrating changing jobs every 3 to 6 months. After being in an IT Specialist position for about a year and half I stumbled on a webpage I created in 9th grade. One page stated "I would become a computer engineer or have some career working with computers." This was the "ah ha" moment of self discovery. I showed my son the webpage, who happen to be with me at work for the summer. This moment help confirm my drive to continue learning everything I could in regards to computers, network infrastructure, security, and computer languages.

One principle lesson I valued growing up is "Don't just be good at something be YOUR BEST!" Owning my own business has always been in the back of my mind. Cyber Security and Cloud is our future. Maybe not everyone has adapted to the world of Technology, but today and for a long time to come technology, computers, and networks will be the driving force of our everyday life.

This is just the beginning phase of my endeavor in technology. I dream of becoming so much more. Stay tuned as I keep you updated with some of the greatest research in Cyber security and Information Technology. I invite you to grow with WilcomputeIT Technologies. The best is yet to come.




WilcomputeIT Technologies LLC
Location Houston, TX 77066
Phone 832-209-8668
Mail rwilson@wilcomputeittechnologies.com


Partnerships

Partner Partner Partner Partner Partner