Back to Top

Scroll Down

 


Welcome to Squared Eye!

My name is Susan K. and I am an ethical hacker. I help businesses keep their data safe.

About this website

I'll be 100% honest with you: I have created this site because I wanted to use it as a client attraction platform. Yeah, no beating around the bush here, Jimmy. And if your business utilizes a computer network, it may be attacked at any time!

Hopefully, you'll read a few of my articles, you will discover that I am a very knowledgeable security consultant, and you will want to use my services. So, what are you waiting for? Check out a few excerpts from my most recent articles below, or go straight to the blog.

Recent articles

Is your home router vulnerable to Cherry Blossom attacks?


Apparently, some governments are more than eager to invest a portion of their huge budgets into hacking tools. And one of these sets of tools, named Cherry Blossom, has recently made quite a few waves. Why? For starters, it utilizes a new infection method: it alters router firmware, injecting modified code into it. This means that most applications (antiviruses, software-based firewalls, etc.) won't be effective against it; they won't be able to detect any problem, because the attack takes place at a lower, hardware-based level.


It's a huge issue, because the routers' built-in firewalls are the only effective means of protecting for most home users. So, once that the router is compromised, everything that you are doing online may also be compromised.


READ THE ARTICLE


Public Wi-Fi security risks



If you are like most people, you ask for the wireless password the minute you've arrived at a new hotel. A recent study has shown that, on average, hotel guests connect to the Wi-Fi network within seven minutes. Or maybe you have gotten used to working for your company from the comfort of your local coffee shop once or twice a week. That’s what almost 27% of the people who work for big corporations do, according to Data Alliance. If you are doing any of these things, you should stop right away! Here's why.


Cyber criminals make lots of money by stealing the freely available information that can be gathered near and around a public hotspot. Often times, they begin by ordering a coffee, and then asking for the Wi-Fi password, the way any regular customer would do. But then, things will quickly get much more dangerous.


READ THE ARTICLE


WPA3 fixes the KRACK Vulnerability


Do you remember the KRACK vulnerability? You should, because I have covered it in this article a while ago. It happened at the end of 2017, and it's a severe issue of the WPA2 protocol, which was considered to be 100% secure until then. The sad news is that almost any Wi-Fi enabled device is vulnerable, and there aren't too many things to be done about it yet.


A recent report highlighted the fact that almost 50% of Android devices are vulnerable to this exploit. There is a simple explanation for that: phone manufacturers aren't quick to implement Google's security patches, because they have customized the android OS to their liking, rather than offering it to their users as it was compiled by Google.


READ THE ARTICLE

Latest Cybersecurity Threats

I take each and every security issue seriously, and so should you! Here are the latest threats in the cyberworld.

The Red Hat Linux DHCP client is vulnerable


A security researcher has recently discovered a remote command injection vulnerability in the Red Hat Linux DHCP client. The vulnerability allows the attackers to run commands with root privileges on the targeted systems.


MORE INFO

Adobe Releases Critical Security Updates


Adobe has just patched Acrobat Reader and Photoshop CC for Windows and macOS. The patch addresses 48 different vulnerabilities; most of them would allow allow arbitrary code execution in the context of the targeted user.


MORE INFO

OEMs required to send out Android patches regularly


If you own a regular Android smartphone, I guarantee that it's not properly patched. I've got some great news, though; starting with Android P, Google will force smartphone manufacturers to patch their products regularly.


MORE INFO

Cryptocurrency mining virus spreads through Facebook


We all love Facebook Messenger, right?  However, cybersecurity researchers have discovered an evil Chrome extension that spreads through Facebook Messenger, targeting users who trade cryptocurrencies.


MORE INFO