Cyber Attacks

Home/Tag:Cyber Attacks

Trusted Platform Module (TPM)

2020-09-02T05:37:26+00:00Categories: Computer & Network Concepts|Tags: , , , , , , , , , , , , , , , , , , , |

TPM stands for trusted platform module. TPM also called is ISO/IEC 11889. TPM is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. A TPM is actually a microchip on the motherboard of most servers and even today's clients. The main function of TPM is to [...]

OS Fingerprinting

2020-07-25T12:57:16+00:00Categories: Network Security|Tags: , , , , , , , , , , , , |

If a hacker can determine what type of operating system a targeted computer is running, he or she can work to exploit the vulnerabilities present in that operating system. OS Fingerprinting is used by security professionals and hackers for mapping remote networks and determining which vulnerabilities might be present to exploit. In fact, it is [...]

Buffer Overflow Attack

2020-07-25T12:58:52+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , |

Buffers are memory storage regions that temporarily hold data while it is being transferred from one location to another. These buffers typically live in RAM memory. Most modern hard drives take advantage of buffering to efficiently access data. Buffer is also widely used in online video streaming and buffers are frequently used in online video [...]

Macro Virus

2020-09-26T06:36:35+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , |

What’s a macro? It’s a small program that runs within a bigger program to automate a task (usually a complex or time-consuming task) on a user’s behalf. Macros are written in a programming language designed to work within their broader environment. So, for example, macros for Microsoft Office are currently written in Visual Basic for [...]

Dark Web

2020-09-02T05:29:51+00:00Categories: Computer & Network Concepts|Tags: , , , , , , , , , , , , , , , , , |

The dark web is a part of the internet (or a small part of the deep web) that isn't indexed by search engines. The dark web contains a large amount of illegal and criminal content (from various aspects). Online marketplaces for drugs, exchanges for stolen data, and other illegal activities get most of the attention. [...]

Zero-day Vulnerabilities and Zero-day Exploits

2020-09-24T10:32:09+00:00Categories: Network Security|Tags: , , , , , , , , , , , |

Zero-day is a flaw in software, hardware or firmware that it has the potential to be exploited by cybercriminals. In other words, zero-day is a vulnerability in a system or device that has been disclosed but is not yet patched. A zero day exploit is a cyber-attack that occurs on the same day a weakness [...]

Penetration Testing

2020-09-24T10:36:23+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , |

A penetration test (pen test or pentest and or ethical hacking) is a simulated cyber-attack against a computer system to check for exploitable vulnerabilities. You should not be confused it with a vulnerability assessment. Source: en.wikipedia.org In fact, this test simulates a real-world attack to determine how any defenses will fare and the possible magnitude [...]

SSL and TLS

2020-09-24T11:41:19+00:00Categories: Computer & Network Concepts, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , |

In this post, we'll take a look at SSL protocol and TLS protocol to help you understand the different aspects of these protocols. One of the most important topics in Cyber-security course is web secure.     What’s SSL?  SSL (Secure Sockets Layer) is a protocol for establishing authenticated and encrypted links between networked computers. [...]

Wireless Security Protocols

2020-09-26T05:59:54+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi networks. In this post, we'll take a look at wireless security protocols to help you understand the different aspects of these protocols. Source:  en.wikipedia.org There are several types of wireless security Protocol that you’ll come [...]

Go to Top