Uepisaiti fakatāutaha ʻa e Farhad Mofidi

.

Farhad Mofidi is a computer security scholar and a professional in the field of cybersecurity and security engineering. Talu mei heʻene hoko ko ha blogger taʻu hongofulu tupu ʻo Peasia, he has had to deal with censorship, puleʻanga surveillance, mo fakautuutu e ngaahi ʻohofi ʻoku fai ʻi he ʻInitaneti.

H
e later moved to the United States, where he studied information security, engineering, and business administration. As an American cybersecurity expert, Farhad also worked for the U.S. government to help secure U.S. federal government systems.

F
arhad holds an MBA in Information Systems and Finance, ko ha MS ʻi he polokalama fakamatala fakaʻenisinia – Cybersecurity, and is currently completing his PhD in Cybersecurity.

ʻI he
addition to his educational and professional endeavors, Farhad remains dedicated to raising awareness about the importance of cybersecurity and advocating for digital rights. He actively participates in activities and discussions, sharing his insights on the evolving cyber landscape and the need for proactive measures to mitigate risks.

T
his weblog aims to gradually collect and publish some of his works in English.

Fakahoko

Ko e akoʻi moʻoni ko ha fakakaukau fakafoʻituitui

KAMATA HE ʻAHO NI

Mei heʻeku blog

WaterHole attack

Fuʻifuʻi e ngaahi ʻohofi ʻo: founga ʻoku kau faihia ai ʻa e infiltrate malu infrastructures

My first encounter with the world of cyber-criminals occurred through a watering hole attack campaign many years ago. I visited a Persian website and discovered that it was downloading malware[…]

Lau ke lahi ange
credential stuffing

Credential ʻoku ʻikai ko ha Uetosi!

I have heard this many times over the course of the last several years: someone is experiencing a heavy DDoS attack on their website. When I ask them what type[…]

Lau ke lahi ange
application ddos attacks

Ko hono fakaʻaongaʻi ʻo e ngaahi ʻohofi ʻa e Uetosi, mo e founga ʻe lava ke fakasiʻisiʻi ange ai

DDoS (distributed denial of service) and DoS (denial of service) attacks can be broadly classified into three categories based on the layers of the OSI model they target: network layer[…]

Lau ke lahi ange

Fetuʻutaki Mai Kiate Kimautol