Password Security – First Line of Defense against Cyber-Attacks

We saw a great deal of high-profile cyberattacks in 2017 like Deloitte, Uber , Equifax, and the WannaCry ransomware attack which literally made the cyber world cry! The happened, the hacking of the Winter Olympics, which started the 2018 year with a bang. Businesses, as well as the cybersecurity industry as a whole, are not […]

Canary Tokens and Honeypots

“ Alert!! Your system is compromised! ” It is not concerned until there is a loss in the data or private files. Why wait so long? Maybe this interests you if I say this article says about one of the simplest ways to protect your privacy and keep them secured. Track down before it gets […]

Protecting Mobile Application- Developer Side

We know that nowadays the usage of smartphones is growing exponentially. The mobile devices that are in use are more than three billion according to Statista and it might grow to a much higher number in the coming years. Smartphones became an essential tool for all to maintain their personal data, business data, and many […]

Hashing

From the cryptography introduction, we are aware of hashing! If not exactly remembering, a quick recap! Hashing or a hashing function is a type of operation that takes arbitrary data as input and converts it to an output of fixed size. The fixed size resulting output is known as a hash digest. Actually, the size […]

Brute Force Attacks

So far we are good with what are different types of attacks by using Malware, Trojans, Adware, etc. Now a small question. Have you ever used the same password for most of your logins across sites? Are we too lazy to remember too many passwords? Then our data is at risk. Forget about the same […]

Network Attacks

We have already learned about types of threats, actors, etc. Network attack is an attack in which intruder takes an unauthorized control over a company’s network using different techniques. This can cause heavy loss both at privacy levels and financially. We will now look more about them. DNS Cache Poisoning We know what DNS servers […]

Search Engine Optimization (SEO)

I have seen some meme, “If you want to bury a dead body, do it on the third search result page of Google. No one visits it!” (not intended to offend) When we search on a search engine, say on Google, we will get most relevant results on the first page. Even there are numerous […]

Transmission Modes in Networking

We have learnt about the cables earlier. Once these cables are connected to the devices, they carry electric charge. We are also aware that the data is transmitted in the form of binary numbers, ones and zeroes. These ones and zeroes are sent through a process called Modulation. Modulation is the way altering the voltage […]

Networking devices

We have read about cables that provide point-to-point connection. If not, you can find it here! But these are networks where only a single device can operate on each end. But with some billion computer devices today, cables cannot be of much use. Inorder to overcome this, many network devices are invented that allow multiple […]

Cables in Networking

Networking devices or networking hardware are the equipment essential for the communication and interaction among the devices over a network. Computer Networking is a huge part of the day to day role of many IT Specialists, and knowing how to differentiate different network devices will be more essential. Now, we shall look into different networking devices. Cables […]

VAPT continued!

What is VAPT? Why is it needed? How it is done? Some of the details have already been discussed so far. If you have missed it, find it here! Penetration Testing have been learnt and now we shall go for Vulnerability Assessment. A vulnerability assessment is a process of finding out the vulnerabilities (mistakes or […]

VAPT

Development doesn’t happen suddenly. If it had happened so, it is not development. Any highest grossing companies, Google for example,V have their earlier and the later phases. Same as for the companies, Internet also has its earlier phase. During that phase not everything is well secured and equipped as today it is. Vulnerabilities existed all […]

Types of Security attacks

Have your friends ever asked you to pass on some message to someone? Yes? It is obvious. Sometimes we tell the exact information but sometimes we forget some and modify in our own style and convey the message😂. Quiet common!! The intention for the above context is not our memory, but is modification of a […]

Network Protocols

” Our Honorable President will be the chief guest of Convocation Ceremony! The accomplishments will be awarded to the students following certain protocols. ” These are the words I heard when I have attended a convocation ceremony. The point to focus here is not our President, its Protocol. What is a protocol? Why it is […]