Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Utah Student Gives Hackers False Information to Thwart Phishing

    Utah Student Gives Hackers False Information to Thwart Phishing

    June 3, 2024

    A group of Utah students have taken it upon themselves to counter phishing attempts by using their computer skills to bring down fraudulent websites, thereby protecting potential victims.

    One of the Davis County high school juniors, Charles Mortensen, developed VEGA. This system aims to protect phishing victims and outsmarting hackers by feeding them false information and rendering their phishing pages useless.

    Utah Student Motivated By Personal Connection to Hacking Victims

    “All my friends and peers around me got hacked,” Mortensen told a local reporter. Mortensen, a student at Davis County High School, said he witnessed a rising tide of hacking incidents within his community. He cited an incident where a friend of his residing in foster care fell victim to an Instagram phishing attempt, jeopardizing her only means of maintaining contact with her mom.

    Affected by these hacking incidents among his peers, Mortensen took it upon himself to create VEGA (Victims’ Empowerment Guard against Attacks). As phishing websites expect victims to enter legitimate information or credentials for compromise, VEGA attempts to subvert these attempts by feeding them fake details such as fake usernames and fake passwords.

    Source: kslnewsradio.com (Credit: Charles Mortensen)

    Mortensen has stated that he has observed success with the VEGA system’s attempts to feed hackers with streams of false information. He was quoted by KSL News Radio as saying, “I can send about half a million requests to one hacker within a night. I just let VEGA run overnight and then normally when I wake up … the website [is] shut down.”

    Student Sought Help From Peers With Anti-Phishing System

    While Mortensen is limited to running the program on his own personal system for now, he expressed his hopes to get VEGA running on ‘a whole bunch of computers.’ He claims that VEGA is able to take down thirty phishing sites within a month, and access to more computer systems could allow him to take down thousands of phishing sites in a month.

    Mortensen is seeking a sponsor to enable him to access more computers systems, allowing him to develop a bigger system that could potentially dismantle much larger volumes of phishing sites. Mortensen is a high school junior at the Davis Catalyst Center and sought help from his friends Regan Hosea and Jordan Kingston in helping him make this system work better after developing the first release of VEGA.

    If Mortensen’s claims of taking down phishing sites are as claimed, they could potentially serve an example of the initial stages of an innovative system to counter phishing, which remains a significant security challenge affecting organizations of all sizes. Mortensen’s VEGA system could offer hope to the phishing victims among his peers while fostering further collaboration in developing similar defenses against rising security threats.

    Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleAI Threats, Cybersecurity Uses Outlined by Gartner Analyst
    Next Article China Increasingly Targeting Canadians with Cyber Operations

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-48187 – RAGFlow Authentication Bypass

    May 17, 2025
    Leave A Reply Cancel Reply

    Hostinger

    Continue Reading

    Faster, stronger Flash 2.0 now available in the Gemini app for all users

    News & Updates

    Zeroheight Releases Its Design Systems Report 2025

    Web Development

    Report: Ethical AI use will be a competitive business advantage

    Development

    CVE-2025-24223 – Apple Safari Web Content Memory Corruption Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    Development

    MetaGPT and MetaGPT RAG Module (with Sturdy Design of the Llama-Index)

    April 10, 2024

    In today’s fast-paced world, software companies must efficiently handle complex tasks. However, traditional methods often…

    Ultimate Cyber Hygiene Guide: Learn How to Simplify Your Security Efforts

    June 7, 2024

    From diagrams to design: How AI transforms system design

    July 3, 2024

    CVE-2025-4179 – Flynax Bridge WordPress Privilege Escalation

    May 2, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.