Ethical Hacking Articles

Page 9 of 16

What Is a 51% Attack, and How Much Would It Cost?

Bhavani Vangipurapu
Bhavani Vangipurapu
Updated on 02-Dec-2022 897 Views

If you're like most people, you don't really understand what a 51% attack is. After all, it's not something that you or your average person experiences on a daily basis. In this article, you will explore what is 51% attack and how much would it cost. What is a 51% attack? A 51% attack is a potential attack on a blockchain−usually Bitcoin's, Greencoin's or Ethereum's−where an organization or individual gains control of more than 50% of the network's mining power or computational power. With this much control, they could theoretically − Reverse or modify transactions Prevent new transactions from ...

Read More

What is a 401k plan and how does it work?

Bhavani Vangipurapu
Bhavani Vangipurapu
Updated on 02-Dec-2022 550 Views

401 K plans are retirement savings accounts that are offered by employers, typically ()in the United States. This article is a basic introduction to 401 ks and how they work, with sections on what they can be used for and who they're available to. It allows you to set aside money for your future. The money that you contribute to your 401k plan is deducted from your paycheck before taxes are taken out. This means that you will pay less in taxes now, and you will have more money saved for retirement. Your 401k plan will also offer you ...

Read More

What is the 0x protocol?

Bhavani Vangipurapu
Bhavani Vangipurapu
Updated on 02-Dec-2022 703 Views

The 0x protocol is a decentralized exchange that allows for the buying and selling of Ethereum−based tokens. The article goes into detail about how this process works as well as how it benefits individuals who are looking to invest in cryptocurrency. What is 0x? 0x is an open−source protocol that enables the peer−to−peer exchange of assets on the Ethereum blockchain. The protocol is designed to be modular and extensible, and it features a decentralized exchange that is powered by smart contracts. 0x is free to use and it does not require a central authority. The protocol can be used to ...

Read More

What is a shielded transaction?

Bhavani Vangipurapu
Bhavani Vangipurapu
Updated on 02-Dec-2022 650 Views

A shielded transaction is a type of cryptocurrency transaction that uses Zcash's zk−SNARK protocol to keep the sender, receiver, and transaction amount private. This article will explain how shielded transactions work and why they are useful. What is a shielded transaction? When it comes to cryptocurrency transactions, there are two main types − unshielded and shielded. Unshielded transactions are the more common of the two, and they work just like regular fiat currency transactions. Shielded transactions, on the other hand, offer more privacy and security. However, shielded transactions come with a few trade−offs. First, they're much more complicated to set ...

Read More

What is a decentralized API?

Bhavani Vangipurapu
Bhavani Vangipurapu
Updated on 02-Dec-2022 2K+ Views

In the traditional web development model, a single server hosts all of the resources that an application needs to function. However, this model has a number of drawbacks, which have led to the development of decentralized APIs. In this article, we'll take a look at what decentralized APIs are and how they can be used to improve the web development process. What is an API? An API is an interface that allows two pieces of software to communicate with each other. It is a set of rules that govern how data is exchanged between the two systems. An API can ...

Read More

What is Credential Stuffing? (How it Works, How to Prevent)

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 02-Jun-2022 546 Views

What is Credential Stuffing?Credential stuffing is a term for hacking in which a hacker secures user credentials by breaching a system and then tries to utilize those credentials with other systems. Like different types of related hacking, Credential stuffing attacks rely on hackers to break into a network and steal sensitive user information such as passwords and usernames.Credential stuffing occurs when hackers take stolen information from one site or system and use it in a brute force hacking attempt to gain access to multiple other systems. Hackers will sometimes check whether a password or username can be used on another ...

Read More

Why did Facebook recently buy passwords off Black market?

karthikeya Boyini
karthikeya Boyini
Updated on 11-May-2022 294 Views

Facebook, a very popular social networking site, that helps you connect with people. Some of you are well acquainted with and some you don’t, still you get a chance to make new friends and we learn a lot of things, updates on latest movies’ gossip and the list goes on. So, our Facebook account is a pass key to know everything going around the world starting from our street, city, to country and world.Just like bank accounts we prefer to keep our Facebook account private, just to ourselves, like you can share your account number with someone but not your ...

Read More

What are the Effects of Cyberwarfare?

Revathy Nair
Revathy Nair
Updated on 20-Apr-2022 2K+ Views

What is Cyberwarfare?In this twenty-first century, one-third of the world's population has access to technology. These technological changes have led to war among nations, and the nature of war has transformed. So, we can say that the world is entering into a new age of warfare; it is an Internet-based conflict.Cyberwarfare is a well-planned competition conducted in cyberspace. It allows countries to conduct undercover operations on a large scale anonymously. Cyberwarfare can occur in at least five different spaces—economic, societal, cultural/intellectual, military, and political. Cyberwarfare is basically the theft of critical data or hacking data of institutions, businesses, or governments. ...

Read More

Cybercrime and its Impacts on Younger Generation

Revathy Nair
Revathy Nair
Updated on 20-Apr-2022 5K+ Views

What is Cybercrime?Cybercrime is also known as Computer Crime, which specifically involves a computer and a network. The computer involved could be the guilty or the victim. Cybercrime could be responsible for harming somebody's both financial health and security.Cybercrime can be intercepting or disclosing someone's private information while being sent or received. This information could be very confidential. Globally, both government officials and non-officials engage in computer crimes like espionage, financial theft, and other cross-border crimes.Two main categories of Cybercrimes are as follows −Criminal activity that targets computersCybercrimes that target computers often involve malware like viruses.Criminal activity that uses computersCybercrimes ...

Read More

How to Combat Injection Attacks?

Revathy Nair
Revathy Nair
Updated on 20-Apr-2022 451 Views

What is an Injection Attack?Cyber Hackings can occur due to a security flaw of any site which then leads to the extraction of private information, inserted or deleted data, and destroys operations for the entire website. Injections are one of the oldest and the most dangerous attacks focussing on harming web applications. It is because it tops the list of vulnerabilities. The codes received by the server from the browser are executed. It may result in loss of knowledge and denial of access. To avoid injection attacks, one must code their web applications in the most secure way possible to ...

Read More
Showing 81–90 of 160 articles
« Prev 1 7 8 9 10 11 16 Next »
Advertisements