[HINDI] What is juice jacking? Think twice before using public USB ports
What is juice jacking?
Hello Guys aaj hum aaye hai ek aur interesting topic jo hai juice jacking toh phir abhi iska naam sunke...
Firewall Implementation
Administrators must be able to evaluate implementation issues to achieve a successful security solution for their systems. Understanding the type of firewall means knowing how the firewall...
Session Hijacking
Another form of attack is session hacking or hijacking. TCP session hijacking is a process where a hacker takes over a TCP session between two machines. Because...
Introduction to VPN
Virtual Private Networks (VPNs) are a common way to connect remotely to a network in a secure fashion. A VPN creates a private network connection over the...
Ethical Hacking – Famous Hackers
We will have a brief synopsis of some of the famous Hackers and how they became famous.
Jonathan James
Jonathan James was an American hacker, illfamous as the first juvenile sent...
VPN Protocols
Multiple ways exist to achieve the encryption needs of a VPN. Certain network protocols are frequently used for VPNs. The two most commonly used protocols for this...
OWASP Top 10 Web Application Vulnerability 2020
1. Injection
Injection flaws occur when untrusted data sent to an interpreter through a form input or some other data submission to a web...
Introduction To Cyber Security
Introduction
Cybersecurity is the protection of Internet-connected systems, including hardware, software, and data from cyber-attacks. It can be made up of two words one...
Each DNS attack now costs finance companies an average of £1.1m
The average cost of a DNS attack in the financial services industry has risen by 40 per cent over the last year to $1.3m (£1.1m), according to new research.
A...
Intrusion Detection System (IDS) Concepts
There are six basic approaches to intrusion-detection and prevention. Some of these methods are implemented in various software packages, and others are simply strategies that an organisation...