
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 557 Articles for Cyber Security

1K+ Views
Scavenging in cyber security is the process of sifting through a system's data residue in search of sensitive or confidential information. Data scavenging is usually the first stage in any purposeful network assault. To discover as much as possible about a target firm, the attacker employs a combination of network-based tools and Internet search engine searches.Scavenging occurs when top-level hackers dump stolen credentials from a database compromise into a temporary public document for others to utilize. Once they have your information, the hackers try your password on well-known services like PayPal.Why is it Difficult to Detect a Scavenging Attack?For two ... Read More

542 Views
Malicious hackers created a fork bomb, also known as a wabbit or rabbit virus, to execute a denial-of-service attack on the target computer. The fork bomb replication occurs and wreaks havoc on the system's resources. It bogs down the system's performance and can even cause the system to crash owing to a lack of resources.It is a denial of service (DoS) attack that repeatedly uses the fork system call until all system resources have executed a command. Over time, the system becomes overburdened and unable to react to any input.A fork is a Unix and Linux system call that duplicates ... Read More

220 Views
Due to the prevalent use of security software on mobile phones and industry groups targeting malicious transactions, cyber thieves have turned to a new type of malware called chargeware.Chargeware is a type of malware that collects money from the victims without their knowledge or permission. It is a type of malware that infects computers and mobile phones. The program's goal is to trick the user into consenting to a fee and charge confusing terms.Hundreds of thousands of people, especially in France and the United Kingdom, were exposed to similar programs in 2013, installing additional types of malware on their smartphones.Chargeware ... Read More

931 Views
What is Dumpster Diving?Dumpster diving is the practice of exploring garbage for information on a person or company that might be utilized for hacking purposes later. This assault mostly targets major companies or businesses in order to conduct phishing (mainly) by sending victims false emails that look to come from a reputable source.Identity scams take advantage of information gained by breaching the victim's confidentiality. Dumpster divers search the victim's trash for financial statements, government papers, medical bills, résumés, and other documents. Once obtained, the data is utilized to construct identity profiles, increasing the likelihood of social engineering success. Full, usable ... Read More

567 Views
Heartbleed is a critical flaw in the widely used OpenSSL cryptographic software library. This flaw allows information to be stolen that is usually secured by the SSL/TLS cryptography used to secure the Web. SSL/TLS enables communication privacy and security for the internet, mail, messaging services, and some VPNs over the internet.A defect in OpenSSL's implementation of the TLS Heartbeat extension causes the Heartbleed problem, which results in improper input validation.It's an open-source software vulnerability that was initially discovered in 2014. Anyone with access to the Internet can use this flaw to access the memory of system vulnerabilities, leaving no trace ... Read More

4K+ Views
Backdoor Trojans are malicious software programs that provide unauthorized access to a computer in order to launch a remote attack. Remote attackers can use a hacked machine to send commands or gain complete control.Backdoor malware and viruses circumvent authentication protocols in order to gain access to systems and avoid detection. Once a Trojan has gained a footing in a system, it adds itself to the starting routine of the computer, preventing harmful programs from being permanently terminated by rebooting the machine.Backdoor malware is commonly referred to as a Trojan. A Trojan horse is a malicious computer software that masquerades as ... Read More

631 Views
A Gray Hat programmer is a programmer who may violate moral conventions or standards, but not with the malicious intent associated with dark cap programmers. Gray Hat programmers may participate in practices that appear to be less than completely above board, yet they are typically working for the greater good.Gray hat programmers bridge the gap between white cap programmers, who try to ensure that safe frameworks are maintained, and dark cap programmers, who act vindictively to exploit flaws in frameworks.Gray hat hackers are between white and black hat hackers. Gray hat hackers use a combination of black hat and white ... Read More

447 Views
The "SolarWinds hack", a cyberattack uncovered lately in the United States, has emerged as one of the largest ever targeted against the United States government, its agencies, and several private enterprises. In reality, this is likely a global cyberattack.FireEye, a cybersecurity firm based in the United States, was the first to find it, and further details have emerged since then. The scope of the cyber-attack is unknown; however, it is thought that the US Treasury, Department of Homeland Security, Department of Commerce, and elements of the Pentagon were all affected.What is SolarWinds, Exactly?SolarWinds is a large software firm based in ... Read More

2K+ Views
Rogue security software is a malicious software that deceives users into believing their computer is afflicted with a virus in order to induce them to pay for a phony malware removal application that really installs malware. It is a type of scareware that manipulates victims by instilling fear in them, as well as a type of ransomware. Since 2008, rogue security software has posed a severe security concern to desktop computers. SpySheriff and its clones were an early example that acquired notoriety.Rogueware is a type of ransomware that is frequently associated with huge cybercrime networks in which hackers distribute Trojan ... Read More

302 Views
What is FIDO?FIDO (Fast ID Online) is a collection of technology-neutral solid authentication security protocols. The FIDO Alliance, a non-profit organization dedicated to standardizing authentication at the client and protocol layers, created FIDO.The FIDO specifications support multifactor authentication (MFA) and public-key cryptography. FIDO keeps it locally on the user's device to protect personally-identifying information (PII), such as biometric authentication data, rather than in a password database.The Universal Authentication Framework (UAF) and the Universal Second Factor (U2F) protocols are supported by FIDO. During registration with an online service, the client device establishes a new key pair using UAF and keeps the ... Read More