In the fast moving world of cybersecurity, it is necessary for us to stay updated of the latest vulnerabilities and patch them immediately to prevent any incident from occurring.
Category: Threats
WHAT IS A FIREWALL? – IMPORTANCE & TYPES OF A FIREWALL
There are hackers spreading malicious data to your networks and a firewall acts as a barrier to prevent the entry of malicious data into the network by blocking unknown traffic from entering your network and thereby securing the network from cyber attacks.
Cybersecurity Checklist
A detailed look into cybersecurity checklist that an organisation can follow to avoid any security incidents and financial loss in the future due to poor security posture.
History of Encryption
Encryption is the method of converting the data into an encoded form. There are various ways this can be achieved. Julius Caesar invented the Caesar cipher to hide the messages he sent to his generals.
What is Cybersecurity? Part II
In this article, we will discuss further on the threat actors, their motivation and the different types of cybercrimes happening nowadays globally.
Wireless Security
‘’The era of wireless connectivity is ON! ’’ The world is growing at an enormous pace, technology is at the forefront and ushering the world into the new age of wireless devices surrounding us. The Internet is the medium that connects the whole world together. The 4.57 billion people on the planet Earth use the internet for a variety of different tasks i.e that’s almost 60% of the world total population. Most of this population use a wireless device to access the internet like a smartphone, tablet or a laptop.…
What is Cybersecurity?
Ever since the introduction of the internet the term cyber security has become very prominent and one of the most searched terms on the internet. And more importantly, the accelerated growth of the internet has also paved the way for cyber criminals using different techniques to launch an attack against a targeted victim connected to the internet.
Bangladesh Bank Cyber Attack
“ One of the biggest Cyber Heists” The Bangladesh Bank robbery commonly known as the Bangladesh Bank cyber heist took place in February 2016. This particular heist is considered to be one of the biggest cyber attacks targeted against any government body in the world. What Actually Happened ? On the 4th of February 2016, Hackers stole Millions of dollars from the central bank of bangladesh through the Federal reserve bank of New York. Hackers sent thirty five forged requests with an aim of stealing $1 billion from the Federal…
Common Networking Attacks
“Take good care of your network Infrastructure” An organisation’s network infrastructure is usually large and complex.They are helpful for the business operations but they also pose a huge security threat when not properly maintained. When an attack is targeted against an organisation, the network would be the first to be compromised. What is a Network Attack? Network attacks happen when an attacker tries to gain unauthorised access to the network with an aim to steal data, infect the system with malware and to perform other malicious actions. The attackers can…
BOTS
“Watch out !!!” These days Botnets are currently one of the worst threats on the Internet. The hackers make use of computers by infecting them and using them for malicious activities. Save yourselves!!! What are Bots? Bots are internet connected devices such as Computers, Mobile phones etc, which are used by hackers to launch an attack. A group of bots connected together in a network is called a Botnet. Botnets are used for malicious activities such as performing a DDOS attack, stealing information, ad fraud, clickbaits and many other malicious…