A company is only as strong as the rules it’s built on.
Category: Banner Slider
NMAP
it is mandatory to scan for errors and bugs in your network and also check for vulnerabilities to prevent an intruder from accessing your network
History of Encryption
Encryption is the method of converting the data into an encoded form. There are various ways this can be achieved. Julius Caesar invented the Caesar cipher to hide the messages he sent to his generals.
What is Cybersecurity? Part II
In this article, we will discuss further on the threat actors, their motivation and the different types of cybercrimes happening nowadays globally.
Wireless Security
‘’The era of wireless connectivity is ON! ’’ The world is growing at an enormous pace, technology is at the forefront and ushering the world into the new age of wireless devices surrounding us. The Internet is the medium that connects the whole world together. The 4.57 billion people on the planet Earth use the internet for a variety of different tasks i.e that’s almost 60% of the world total population. Most of this population use a wireless device to access the internet like a smartphone, tablet or a laptop.…
Security Testing
An information security assessment is a process of determining how effectively an entity being assessed (e.g., host, system, network, procedure, person—known as the assessment object) meets specific security objectives
What is Cybersecurity?
Ever since the introduction of the internet the term cyber security has become very prominent and one of the most searched terms on the internet. And more importantly, the accelerated growth of the internet has also paved the way for cyber criminals using different techniques to launch an attack against a targeted victim connected to the internet.
Encryption Frameworks – Public Key Management
“Encrypt your data or lose it” In today’s modern world, there are millions of websites that provide different services, but how are they doing this? How are they shielding themselves from attackers? Using public Key Management to build a safe environment The Internet is a place where the attackers look out for vulnerable websites and networks and are always looking for a loophole to take advantage of. A cyber criminal can change his identity in no time and make himself anonymous. So attackers are on the lookout for bugs and…
Bangladesh Bank Cyber Attack
“ One of the biggest Cyber Heists” The Bangladesh Bank robbery commonly known as the Bangladesh Bank cyber heist took place in February 2016. This particular heist is considered to be one of the biggest cyber attacks targeted against any government body in the world. What Actually Happened ? On the 4th of February 2016, Hackers stole Millions of dollars from the central bank of bangladesh through the Federal reserve bank of New York. Hackers sent thirty five forged requests with an aim of stealing $1 billion from the Federal…
Common Networking Attacks
“Take good care of your network Infrastructure” An organisation’s network infrastructure is usually large and complex.They are helpful for the business operations but they also pose a huge security threat when not properly maintained. When an attack is targeted against an organisation, the network would be the first to be compromised. What is a Network Attack? Network attacks happen when an attacker tries to gain unauthorised access to the network with an aim to steal data, infect the system with malware and to perform other malicious actions. The attackers can…