I am sure many of you are wondering what the best security method is when using wireless keys. There are several types of wireless security that you’ll come across: let’s have a look at some of them.
Security researchers have discovered a new technique that could allow attackers to inject malicious code into every version of Microsoft’s Windows operating system, even Windows 10, in ways that no existing anti-malware tool can currently detect, which is a huge threat to millions of PC users around the world.
What is a Denial-of-Service (DoS) Attack & How can you Prevent it?
It’s a wonderful day at the office, all services and servers are working as they should and everything is running smoothly. Until the moment everything starts to get increasingly slower; services become unresponsive and the server’s resources are high, so high that it could crash the services entirely. Read More »
As we have looked at in earlier articles there are 2 types of routers: static and dynamic. As we have mentioned, a static router is manually added by administrators; the procedure for which can often be difficult in larger networks. That’s where dynamic routing protocols come in; they are responsible for updating this information automatically in the routing table of network attached devices. Read More »
As we can see from this previous article a router is the device responsible for routing packets between different networks. We have already covered that a router holds 2 types of routes in its routing table: Static and Dynamic. Read More »
Previously we looked at a MITM (Man-In-The-Middle) hacking technique called ARP spoofing; now we will look at what is known as DNS spoofing. DNS Spoofing is again like ARP spoofing; it’s a MITM attack that provides wrong (false) name resolving information about an IP. For example let’s say you have your bank website:
There are various different types of malware and different ways that they have been built to infect systems. One of those types is called macro malware, which are essentially scripts that contain several commands for the automation of tasks for different applications through Microsoft Office documents. Characteristically, macro are provided as a mechanism for us to improve and work better with automations in Word, Excel etc.
Read More »
The Cloud for a while now has been a buzzword in the field of tech. However it isn’t the only way to move forward with today’s technology. We are going to discuss some alternatives ways in which you can work without using the Cloud.
Is our data secure on the internet or is confidential information that we upload at risk on the internet?
The answer is YES it is at risk.
Over the years, this issue has been proven many times over. Millions of companies per year have the horrible experience of having their confidential data stolen.
Using sniffing methods, hackers can easily steal any personal data over the internet, it is not easy to do of course but by hijacking a BGP session an expert can get into your ISP and start a “man in the middle” attack.