
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 987 Articles for Safe & Security

615 Views
What is Clop Ransomware? Jakub Kroustek discovered Clop, a ransomware-like virus. This malware is programmed to encrypt data and rename files with the ". Clop" extension. It is a part of the wellknown Cryptomix ransomware family. It uses the AES cipher to encrypt images, movies, music, databases, papers, and attachments. The CLOP or ".CIOP" file extension stops victims from accessing their personal information. Clop ransomware is regarded as extremely severe malware because it can infect most operating system versions, including Windows XP, Windows 7, Windows 8, Windows 8.1, and Windows 10. Clop virus gets its name ... Read More

591 Views
A type of malware called Dridex targets the financial data of its victims. Software that is meant to harm a user is known as malware or malicious software. The Dridex malware is specifically categorized as a Trojan that conceals dangerous code within seemingly benign data. The primary objective of the Dridex malware is to steal private information from the bank accounts of its victims, such as their login information for online banking and financial access. It sends spam email campaigns to Windows users to trick people into opening an email attachment containing a Word or Excel file. Because ... Read More

456 Views
What is broken user authentication? Poor implementation of API authentication allows attackers to predict other user’s identities. In more general terms, broken user authentication occurs when an API having an authentication system but does not in working, or that the implemented authentication system fails in some cases, allowing attackers to project himself as an authenticated user. The weaknesses present in the system, mentioned above, will be divided into two different groups, namely poor credential management and poor session management. A. Poor credential management Victim credentials can be collected to gain access to the system. There are various ways that the ... Read More

506 Views
What is Broken Object-Level Authorization? Broken object-level authorizations (BOLA) is also known as insecure direct object reference (IDOR). This issue occurs when the server does not properly verify if the currently authorized user or an unauthorized user is accessing data to read, update or delete an object to which they are not having the rights. Types of Broken Object Level Authorization (BOLA Mainly there are 2 types of BOLA. Those can be carried out if a userID is passed on to the server or an objectID, we will look into both. Based on User ID If a userID is passing ... Read More

1K+ Views
What Is Application Programming Interface. API is the acronym for Application Programming Interface, API is a set of defined rules that explain how computers or applications communicate with one another. APIs implemented between application and web server, acting as an intermediary layer that processes data transfer between systems. Types of API’s They are four main types of API’s Open APIs− Open-source application programming interfaces Also known as Public API, there are no restrictions to access these types of APIs because they are publicly available. Open APIs can been can been access by any developer. Partner APIs− This API exposed ... Read More

414 Views
Unfortunately, the COVID-19 outbreak provided numerous possibilities for criminal actors to prey on vulnerable, suddenly-removed personnel. In 2021, inadequate security postures will allow hackers to continue infecting businesses with ransomware, leading to data breaches, according to TechRepublic. As companies migrate to anyplace operations, cybersecurity investment is only natural to rise this year. What is Cybersecurity Mesh? Today there are two buzzwords in cybersecurity: ZeroTrust and Cybersecurity Mesh. Although the concept of a zero-trust architecture has been around for almost two decades, using it to design your security infrastructure just became popular approximately four years ago. On the other hand, Cybersecurity ... Read More

1K+ Views
What is Behavior Monitoring? Behavior Monitoring is the process of collecting and analyzing the network information to detect malicious activities. It is also referred to as network behavior analysis (NBA) or network behavior anomaly detection. Behavioral monitoring software analyses data from various sources and employs machine learning to spot trends that could indicate an attack is underway. In IT, behavioral monitoring checks and controls end-user, device, and network behavior patterns. The baseline is a model behavioral profile that the monitoring solution creates for individuals and devices. For each person, device, or app, a baseline would be set. This becomes easier ... Read More

540 Views
What is a VPN? A VPN is a way to secure your privacy, but selecting one is a trust exercise. You're giving third-party access to a lot of your internet data, so you want to make sure they'll keep it safe and not misuse it. It can be difficult to know which VPN providers are trustworthy if you're new to using one. There are, fortunately, steps you can take to evaluate a VPN company before committing. Here's how to evaluate a VPN provider so you can decide whether or not they're worth your time and money. Check the Provider's Logging ... Read More

337 Views
What is Ingress Filtering? Enterprises and Internet Service Providers (ISPs) utilize ingress filtering to prevent suspicious traffic from entering a network. Ingress filtering inspects all inbound packets and then accepts or denies admission to the network depending on the information in the packet header when implemented on an edge device such as a router or firewall. Packet filtering is what it is. One of the primary blockades in a network security plan is ingress traffic filtering. Its goal is to thwart cyberattacks, particularly denial of service (DoS) operations involving IP address spoofing. Ingress traffic filtering can be defined as a ... Read More

511 Views
Egress filtering is the practice of monitoring or restricting outgoing data, usually through the use of a firewall that stops packets that do not match particular security standards. The word “egress” means “outgoing, ” and an egress router is one that allows packets to exit one network and enter another. Egress filtering’s major goal is to prevent undesirable or harmful traffic (such as malware, illegal E-mail messages, or requests to Web sites) from leaving a network. A firewall, for example, might be used to prevent students on a university’s campus network from sending viruses or infringing content from any of ... Read More