SHA1 collision – What’s it all about?

Why should we be concerned about the successful SHA-1 collision attack that was recently demonstrated by Google researchers?

I take a look at encryption, cryptographic hashing, and why this attack is a big deal.

The 2016 Alien Eye In the Sky Recap

Today is the last Alien Eye in The Sky episode for 2016, so rather than just recapping the week, we thought we’d take a look at what’s transpired over the course of 2016.

To be honest, I underestimated the huge task at hand, and after researching several hundred breaches, decided that it was better to break down the incidents into trends and take samples from each.

Hopefully this will give a renewed appreciation of how much the cyber security challenge is growing across the world and across all industries.

So, without further ado, all the stories mentioned in the video are linked below.

Happy holidays everybody!


Online dating

Adult Friend Finder



Muslim Match.

Password re-use attacks










Banner Health which impacted 3.7m patients

Turkish state hospitals 10m patients.

Queen Mary Hospital in Hong Kong saw 3,600 records accessed

Al Zahra Private Medical Centre in the UAE had 4,600 records accessed.

New Jersey Spine Centre,

Center for Neurolosurgical and Spinal Disorders


It’s Not all fun and Games

steam game keys stolen.

Evony gaming company saw itself targeted twice during the year.

Forums belonging to Clash of Kings and Funcom were breached.



The Philippines commission on Elections was attacked a month before the country held its 3rd automated elections

The personal information of over 93.4million Mexican citizens had their voter registration details exposed online.

Illinois online voter registration portal hacked, information compromised

Every voter in Louisiana’s details exposed

In Ghana, the Electoral Commission had four computers stolen that were used for biometric voter registration.


The Indian institute of management was hacked and reults of CAT exam released

University of Central Florida

N.C State university

Jacksonville State University

University of Liverpool

University of Ottawa missing hard drive with data on 900 students

Saga prefecture schools

Defcon IoT village saw 47 new vulnerabilities discovered in devices


Banking incidents

Tesco Bank Hack

Bank of New Zealand

Royal Bank of Canada

SunTrust Bank

Qatar National Bank

Miscellaneous hacks and breaches through the year

Oregon Department of Fish and Wildlife

Azerbaijani hackers leak secret data from Armenian intel server

World Anti-Doping Agence (WADA) hacked

Adani Po  wer Ltd. India Pakistani real estate giant hacked, entire DB leaked.

Siliconware Precision Industries in Taiwan suspected an engineer stole data.

Christians against poverty saw bank details, phone numbers, and other data stolen.

American Association for the Advancement of Science

Rhode Island Blood Enter

Vietnam Airlines

South Africa’s Department of Water Affairs

Yahoo hack

Alien Eye in the Sky Ep 8

Another week, another set of impactful, bizarre, and interesting security stories.


We tried something interesting this week, rather than focusing on a few stories in the video and posting links to others, we’ve crammed them all into one action-packed episode!

Stories covered


Toyota dealer sued for stealing intimate photos off couple’s smartphone


Nice Security Matrix about Office macros (PDF)


Counterproductive security behaviors that must end


How HMRC combats phishing by using DMARC


How publishers are defeating ad blockers and how ad blockers are fighting back


Fake US embassy in Accra ‪Ghana staffed by Turks, flew an American flag and issued fraudulent visas for $6,000.


Did someone put you in the TO: instead of the BCC: ? Do This…


15 ways to deal with badly written risks

Every so often, a report gets presented which looks like it was written by the work experience student that was employed by the intern.

So what’s the best way to respond? I went on twitter to ask the opinion of folk who have to deal with this kind of thing on a regular basis, and distilled their wisdom into 15 tips.

Other honourable mentions go to:



Alien Eye In The Sky – Security News Roundup

True to form, cyber security continues its domination of technology and mainstream news. Ransomware continues to strike, using different techniques such as Locky’s recent spread through social media, or attacking targets like the San Francisco Municipal Transport Agency.

Password reuse attacks continue to grow. From Deliveroo’s attack a couple of weeks ago, to the UK’s National Lottery this week.

It’s another crazy week – with many “Shatners” thrown in for good measure.

In This Weeks Video

Locky spreads through social media


San Francisco Municipal Transport agency gets hit by ransomware


National Lottery accounts breached


Other interesting stories


PhishLulz is a Ruby toolset aimed at automating Phishing activities


Syscall Auditing at Scale


EU General Data Protection Regulation FAQ’s


Security operations centre (SOC) buyers guide


InPage zero-day exploit used to attack financial institutions in Asia


Generate Geolocation map using WireShark


Brief lessons on handling huge traffic spikes


WiFi Frequency hacker