Recent News

ATM and POS Thermal imaging attacks with cheap Android Apps

Gleaning PIN and Password using thermal imaging devices have been on the rise. ATM and POS these days are installed with electronic keypads and using digital keypads, the users` fingers transfer a minute amount of heat to each key pressed.
This heat can be read by thermal imaging cameras for a short period of time after the keys have been pressed. Thermal Imaging cameras detect and display a large swath of the infrared (IR) spectrum. So, if you are using a keypad to access a door or a safe you are at risk....


A thermal iamging attack is an approach that exploits heat traces to uncover the entered credentials. These attacks rely on the phenomenon of heat transfer from one object to another. During authentication, heat transfers from the users` hands to the surface they are interacting with, leaving heat traces behind that can be analyzed using thermal cameras that operate in the far-infrared spectrum. These traces can be recovered and used to reconstruct the passwords. In some cases, the attack can be successful even 30 seconds after the user has authenticated.
Thermal Imaging attack is a side-channel attack and these are attacks in which a certain confidential information (a password, encryption key, or just data that needs securing) is extracted in a certain non-trivial way. For example, instead of directly cracking an encryption system, an attacker can reconstruct the key based on ever so slight changes in the power consumption of the device.
Instead of secret data being extracted from the processor cache, it can be restored based on indirect signs: a complex chain of unsuccessful attempts to access the data runs a fraction slower or faster, suggesting the presence of a zero or one in the section of data of interest.
Thermal imaging and ATMs
Thermal imaging attacks have been on researchers` radars for more than 15 years and one of the earliest studies in this area explores the most common real-life scenario: attacks on ATMs. It works like this. Let us take a standard ATM keypad:

You go to an ATM, insert your card, enter your PIN, take your cash, and walk off. But unbeknown to you, an attacker sidles up to the same ATM a few moments later, and takes a picture of the keypad using a thermal imager, or thermovisor.

If the image is taken within 30 seconds after the PIN is entered, there is a 50% chance of recovering the sequence. The thermovisor creates an infrared image in which bright and dark areas represent high and low temperatures, respectively. The original purpose of a thermovisor is for checking a building`s walls or windows to determine where pesky drafts are coming from. And now it seems it can be harnessed to steal PINs, although it is worth remembering that we are talking about research here, and not (yet) about real-life attacks.

Early thermovisors used to cost tens of thousands of dollars, while for some time now they are generally priced at a few hundred dollars. And today they can vary in their level of sensitivity (ability to distinguish between small temperature differences).
What do ATMs and smartphones have in common? Not many buttons! In both cases, we are dealing with the input of short combinations of digits. To really test the possibilities of thermal spying, it is best to try it out on real alphanumeric passwords entered on a real keyboard.
Each of these attacks falls into the realm of physical security but leverages technology like thermal cameras to carry out. Hence, the infrared camera apps for android that are being used today by attackers includes;

  • Thermal Camera HD Effect
  • Thermal Camera VR
  • InfraredCamera Free
  • Thermal Camera and Infrared Camera FREE
  • Infrared camera
  • Night Vision Thermal Camera AR
  • Night Vision Flashlight Thermo

Thermal Camera apps adds to the camera view a thermal device image real-time simulation. These free application for Android is perfect to make jokes with your friends and relatives but also can be used by attackers.
NB: After using the ATM or POS keypad, wipe it with a dry clothe or tissue paper.


ATM and POS Thermal imaging attacks with cheap Android Apps 29 October, 2022 by Hazuwa Institute

Which is the Best Antivirus or Endpoint Security Solution for 2023?

Choosing the right security tool that would ensure company's and individual devices are well protected can be a daunting task.
Before stating some of the Best Antivirus Software or Endpoint security solution for personal and office use, you need to understand EndPoint Security...


Endpoint security is the securing of endpoints or end-users devices which includes desktops, laptops, and mobile devices from being exploited by malicious actors and campaigns. However, endpoint security solutions protect the endpoints on a network or in the cloud from cybersecurity threats or exploitation. It is worthy to note that Endpoint security has evolved from traditional antivirus software to providing comprehensive protection from sophisticated malware and evolving zero-day threats.
As cybersecurity threats have evolved, it became very pertinent to enhance endpoint security solutions. Organizations of all sizes are at risk from hacktivists, organized crime, malicious attacks and insider threats.
Hence, Endpoint security is cybersecurity's frontline and the best solution to secure enterprise networks. The importance of Endpoint Security cannot be played down in today's world because data is the most valuable asset of a company and to lose that data, or access to that data, could put the entire business at risk of insolvency.
How does Endpoint Protection Platform work?

  • Endpoint protection platforms (EPP) makes use of protection components which includes File, Mail, Web and Netowrk threat Protection, to examine files as they enter the network.
  • Advanced Endpoint security Solutions uses cloud assited technology that helps to increase the accuracy of verdicts for all protection components, in order to store the database signatures of attack vectors and other threat information which allows global access for greater speed and scalability in securing endpoints.
  • EPP have Endpoint detection and response (EDR) solutions that includes Behaviour detection, Exploit prevention and Host intrusion prevention which allow for the detection of more advanced threats, such as polymorphic attacks, fileless malware, and zero-day attacks. By employing continuous monitoring, the EDR solution can offer better visibility and a variety of response options.
  • EPP uses protection solutions that heuristcally and quickly detect dangerous activities of malware and other threat vectors.
  • EPP provides a centralized management console for system administrators which is installed on a server and allows cybersecurity professionals to control security for each device remotely. EPPs secure endpoints through application control, device control, web control and Adaptive Anomaly control. The centralized console push updates to the endpoints when necessary, authenticate log-in attempts from each device, and administer corporate policies from one location.
  • EPP solutions are available in on-premises or cloud based models which are more scalable and can easily integrate your current architecture. However, certain regulatory/compliance rules may require on-premises security based on industrial standards.

What should the best Endpoint Security Solutions have?
Endpoint security Solutions offer much more than just frontline defenses, by expanding through EDR and XDR to provide better protection and detection alongside collecting analytics. Hence the best ESS should include these;
  • Protection management that includes File threat Protection, Mail threat Protection, Web threat Protection, Netowrk threat Protection and Firewall. This protects against zero-day vulnerabilities and memory-based attacks.
  • Data loss protection (DLP). This prevents access violations caused by insider attacks, including employees, and intentional or unintentional data loss in the event of a system breach. DLP enables organizations to block files transmitted via email or team collaboration tools, as well as files uploaded to the internet.
  • EDR with Advanced machine learning capability, analyzes massive amounts of files and blocks new malware variants before they are executed on endpoint devices. The Behavioral monitoring component is a technique that uses machine learning to monitor behavior-based security to determine risks and block them.
  • Endpoint Controls: Application, web, adaptive anomaly and device controls, enable organizations to control; which devices can upload or download data, access hardware or access the registry, reduce the chances of shadow IT with application allowlists or blocklists, ensuring only approved software and apps are installed on endpoints and control internet web pages access.
  • Monitoring Tools (Reports and alerts). These provide prioritized warnings and alerts regarding vulnerabilities, as well as dashboards and reports that offer visibility into endpoint security.
  • Incident investigation and remediation. These include centralized and automated tools to provide automated incident response approaches and step-by-step workflows to investigate incidents.
  • Rapid detection of Malware. Detecting threats as early as possible is crucial. The longer a threat sits in the environment, the more it spreads and the more damage it can do. Many endpoint security tools now offer real-time detection capabilities.
  • Centralized management of endpoint security with on-premises or cloud deployment options.

Based on the EndPoint Security Solutions requirements as illustrated above which should include;
  • Ransomware protection, behavioral analysis, endpoint detection and response, deep level protection, malware analysis, threat intelligence, coud-assisted technology, byod containerization and advanced centralized console.
  • Sector coverage such as Financial, Manufacturing, Education, Healthcare, Government and FMG, by ensuring that controls, policies and configurations are hardeded correctly and in accordance with each industrial standard cyber security, risk and compliance.
  • Monitoring, identifying and remediating risks and Artificial Intelligence Powered engine.

On the next generation Endpoint Security, some of the best are;
  • Symantec Endpoint Protection
  • Bitdefender Endpoint Security
  • McAfee Endpoint Security
  • Kaspersky Endpoint Security
  • Harmony Endpoint Security
  • Eset Endpoint Security

According to Hazuwa Insitute Cyberlab, the most outstanding with 100% accuracy in detection, protection, AI, advanced admin console, cloud-assisted tech, remediation and industrial coverage is Kaspersky Endpoint Security.


Best Antivirus or Endpoint Security Solution for 2023 29 October, 2022 by Hazuwa Institute

Which is the best Cyber Security Course or Certification to do?

Cyber Security and Information Security are very important for business in today's environment, where companies are facing high risk from malware, and other kinds of software viruses and online threats.
Hence, To achieve your career goals in Information security, you must know these..


Cybersecurity is the body of technologies, processes, and practices designed to protect networks, computers, and data from attack, damage, and unauthorized access. Programs in cybersecurity teach professionals to spot vulnerabilities, fend off attacks, and immediately respond to emergencies.
Cybersecurity basics as well as advanced technology are designed to prevent online threats like tracking, privacy, malware, and other kinds of security loopholes.
Cybersecurity Specialization areas could be in:

  • Network Security
  • End Point Security
  • Penetration Testing
  • Forensic
  • Cryptography
  • etc

To achieve your career goals with industry-recognized learning paths in Cyber Security, you must progress from the Foundational Courses to the Advanced Courses.
The Foundation Courses could be OEM related Security certification, such as; Kaspersky, Checkpoint, Microsoft, CiscoCOBIT (Control Objectives for Information and Related Technologies) and CompTIA Security+.
The Advanced Courses deals with high level security skill training governed by a body and these certifications includes; CISA (Certified Information Systems Auditor), CISM Certified Information Security Manager), CCSP (Certified Cloud Security Professional), CISSP (Certified Information Systems Security Professional), CEH (Certified Ethical Hacker) and KESM (Kaspersky Endpoint Security and Management).


Cyber Security Certification Pathway 14 October, 2022 by Hazuwa Institute

Learn how to setup privacy settings on Browsers, Facebook, Instagram, Titok, WhatsApp etc

The Internet is very convenient and useful but using it has made our personal data more vulnerable. If your personal was leaked within the past 48 hours, there is nothing you can do about it today. Hence, find out more on how you can leverage on Privacy Settings using Kaspersky Privacy Checker Online Tool. A useful tool to check privacy settings for different platforms and devices. For more information click the button below,

Privacy Checker 10 October, 2022 by Hazuwa Institute

Learn how to check your password for any Brute-Force attack

Ypur password is ot safe it if can be brute-forced or found in a database of leaked passwords. To check how strong and secure your password is and how long it will take to crack, click the button below,

Password Checker 1 October, 2022 by Hazuwa Institute

Top Destinations for Digital Nomads in Africa

The destinations were selected accroding to specific criteria and these criteria includes; reliable internet connectivity, co-working spaces, existence of tech ecosystem and beautiful places. The best cities are; Lagos, Nigeria; Nairobi, Kenya; Cairo, Egypt; Marrakesh, Morrocco; Kigali, Rwanda, Abijan, Ivory Coast, Accra, Ghana, Cape Town, South Africa etc. Check out Africa most talented and vetted digital nomads, click the button:

HazPay Digital Nomads 11 October, 2022 by Hazuwa Institute

Why are there so many Security Companies developing protection for Office 365?

The Microsoft Office 365 Security & Compliance Center is an enterprise email security and data protection solution purpose-built for organizations who use Office 365 business products, Outlook, and Exchange servers alike. The Security & Compliance Center provides advanced email threat protection, data protection, policy management, and other cyber security and security management capabilities to ensure vulnerable attack vectors within an organization remain as protected as possible.


Microsoft Office 365 is one of the most widely-used Software as a Service (SaaS) platforms in the world, currently used by over one million companies globally. However, despite its convenience, it also introduces new security risks that organizations must consider and manage as part of their cybersecurity risk management strategies.
Kaspersky Security for Microsoft OFFICE 365. This is an Advanced, all-in-one threat protection for Microsoft Office 365 communication and collaboration services.
Forcepoint offers Risk-adaptive protection for Office 365 that leverage machine learning and behavioral analytics to establish behavioral fingerprints for data stored in Office 365.
For Checkpoint, when considering the risks associated with Office 365, email security is a vital consideration. However, email is not the only attack vector within the Office 365 product suite. Some of the most common security risks that Office 365 users encounter include; Phishing Attacks, Best Practices etc Check Point Harmony Email and Office provides a cloud-based security solution to help close the attack vectors associated with Microsoft Office 365.
Hence, apart from Microsoft Office Security, protecting against the cybersecurity risks associated with Office 365 requires a multi-layered security solution. At the network level, an organization should implement solutions for inspecting emails and other shared content for malware and phishing content, attempted data exfiltration and other threats. However, it is possible that some attacks may slip past these network-level defenses. This requires comprehensive solution that secures users, devices, and access necessary to ensure that all potential attack vectors are closed and that an attack can be detected and remediated at any stage of its lifecycle.


Microsoft Office 365 Security & Compliance 11 October, 2022 by Hazuwa Institute


Scroll to Top