Monday, April 22, 2019
Posted by manager
Reader's rate:
0
Contributed by Sam Dixon Until recently, DDoS (Distributed-Denial-of-Service) attacks were an event that had to be planned and worked for to be executed. An individual or group wishing to execute such an attack would at least have to use the resources available to them or infect machines to create... + continue reading
Friday, April 19, 2019
Posted by manager
Reader's rate:
5
Contributed by Abraham Flores DNS technology acts as the backbone of the internet but suffers from serious vulnerabilities that have been used in major attacks. These attacks include the Mirai botnet DDoS attack on DYN’s DNS services, and the BGP/DNS poisoning of Amazon’s route 53... + continue reading
Thursday, April 18, 2019
Posted by manager
Reader's rate:
2
Contributed by Coley J. Stevens Over the past few years, we seen the rise of drive-by downloads. Drive-by download attacks are malicious automated programs, that are employed on systems without the user’s permission or knowledge. Today, this method is one of the most common ways malware is... + continue reading
Tuesday, March 26, 2019
Posted by manager
Reader's rate:
0
Contributed by Safwan Riyazudeen Paul Sirajudeen The quest to access data effectively and efficiently has brought forth the birth of cloud computing technology.  The cloud computing industry is experiencing hyper-growth recently in the technology community.  It is difficult to imagine an... + continue reading
Monday, March 25, 2019
Posted by manager
Reader's rate:
0
Contributed by Jonathan B. Mcleod There are many threats these days that IT security Professionals have to protect against when maintaining applications that are accessible over the Internet.  One of the most common attacks against web applications is SQL injection attacks.   This... + continue reading

Home Page

Featured Articles

Wednesday, 20/02/19 - 0 comment(s)
Contributed by Subhrodip Roy Chowdhury In recent years, machine learning is revolutionizing almost every field of science due to its unique properties like adaptability, scalability and ability to handle unknown challenges. It is targeted towards reducing human effort and intervention. Identity and Access Management (IAM) is also not an exception... + continue reading
Sunday, 25/11/18 - 0 comment(s)
Contributed by David McDaniel Information security professionals must plan for, identify, and mitigate threats originating from a myriad of sources. While these individuals and teams are required to implement numerous technological controls and protections such as firewalls, intrusion detection systems, strong password usage, and even encryption... + continue reading

Red Tape

Wednesday, 20/02/19 - 0 comment(s)
Contributed by Subhrodip Roy Chowdhury In recent years, machine learning is revolutionizing almost every field of science due to its unique properties like adaptability, scalability and ability to... + continue reading

Cryptography

Monday, 22/05/17 - 0 comment(s)
Contributed by The following paragraphs will how show someone can make sure that a website has a digital certificate, what is a digital certificate and what are the available types, why they... + continue reading

Exploitation

Thursday, 18/04/19 - 0 comment(s)
Contributed by Coley J. Stevens Over the past few years, we seen the rise of drive-by downloads. Drive-by download attacks are malicious automated programs, that are employed on systems without the... + continue reading

Sistema

Sunday, 25/11/18 - 0 comment(s)
Contributed by David Balaban As with all other modern web browsers, Mozilla Firefox offers several features that help sending your data via the World Wide Web. By default, Firefox connects to... + continue reading

Et Cetera

Monday, 22/04/19 - 0 comment(s)
Contributed by Sam Dixon Until recently, DDoS (Distributed-Denial-of-Service) attacks were an event that had to be planned and worked for to be executed. An individual or group wishing to execute... + continue reading

Recommended Reading

Monday, 19/03/18 - 0 comment(s)
Written by Gabriella Coleman I was personally interested in reading about Anonymous and bought this book to satisfy that urge.  It was released in 2014/2015 but an interesting read to... + continue reading