Safe & Security Articles

Page 15 of 88

Dridex Malware – Mode of Operation, How to Detect

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 29-Aug-2022 683 Views

A type of malware called Dridex targets the financial data of its victims. Software that is meant to harm a user is known as malware or malicious software. The Dridex malware is specifically categorized as a Trojan that conceals dangerous code within seemingly benign data. The primary objective of the Dridex malware is to steal private information from the bank accounts of its victims, such as their login information for online banking and financial access. It sends spam email campaigns to Windows users to trick people into opening an email attachment containing a Word or Excel file. Because ...

Read More

Difference between Virus, Worm and Trojan Horse

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 25-Aug-2022 14K+ Views

Viruses, Worms, and Trojan Horses are types of malicious software that infiltrate a system and try to create havoc, however what sets them apart is the way they attack, spread, and replicate. Read though this article to get an overview of how a virus is different from a worm, and what exactly is a Trojan Horse. What is a Virus? A virus is malicious software (malware) made up of little bits of code attached to legitimate programs. When that software is launched, the virus is launched as well. Viruses are malicious programs that infect computer files and spread ...

Read More

Difference Between HTTP and HTTPS

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 25-Aug-2022 2K+ Views

Have you ever seen http:// or https:// in a browser's address bar while surfing a website? In a nutshell, both of these are protocols that allow a web server and a web browser to communicate about a certain website. But, what are the features that distinguish these two? Well, the most important difference between "http" and "https" is that "https" is far more secure than "http". Read through this article to find out more about "http" and "https" and how exactly they are different from each other. The protocol used to send hypertext over the Web is called the HyperText ...

Read More

Broken User Authentication

Govind
Govind
Updated on 25-Aug-2022 561 Views

What is broken user authentication? Poor implementation of API authentication allows attackers to predict other user’s identities. In more general terms, broken user authentication occurs when an API having an authentication system but does not in working, or that the implemented authentication system fails in some cases, allowing attackers to project himself as an authenticated user. The weaknesses present in the system, mentioned above, will be divided into two different groups, namely poor credential management and poor session management. A. Poor credential management Victim credentials can be collected to gain access to the system. There are various ways that the ...

Read More

Broken Object-Level Authorization

Govind
Govind
Updated on 25-Aug-2022 589 Views

What is Broken Object-Level Authorization? Broken object-level authorizations (BOLA) is also known as insecure direct object reference (IDOR). This issue occurs when the server does not properly verify if the currently authorized user or an unauthorized user is accessing data to read, update or delete an object to which they are not having the rights. Types of Broken Object Level Authorization (BOLA Mainly there are 2 types of BOLA. Those can be carried out if a userID is passed on to the server or an objectID, we will look into both. Based on User ID If a userID is passing ...

Read More

Types of Application Programming Interface (API) and their Security vulnerabilities.

Govind
Govind
Updated on 25-Aug-2022 2K+ Views

What Is Application Programming Interface. API is the acronym for Application Programming Interface, API is a set of defined rules that explain how computers or applications communicate with one another. APIs implemented between application and web server, acting as an intermediary layer that processes data transfer between systems. Types of API’s They are four main types of API’s Open APIs− Open-source application programming interfaces Also known as Public API, there are no restrictions to access these types of APIs because they are publicly available. Open APIs can been can been access by any developer. Partner APIs− This API exposed ...

Read More

Difference between Firewall and Anti-virus

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 23-Aug-2022 1K+ Views

Both Firewall and Antivirus are security tools that protect the computer systems as well as the network infrastructure from virus, worms, Trojans, and other such cyber-threats. Firewalls scan and evaluate the data packets before they enter into a network, and then they either allow or deny the data packets based on certain predefined rules setup by the network protocols. Firewalls can be implemented both at the software and hardware levels, while an antivirus program can be implemented only at the software level. Read through this article to know more about Firewall and Antivirus and how they are different from each ...

Read More

Difference between Malware and Adware

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 22-Aug-2022 2K+ Views

A Malware is a malicious program that is used by attackers to perform illegal operations on a user's machine, such as stealing personal information, corrupting system/network, encrypting data for "ransom" or deleting the data, etc.An Adware is a program that displays Ads during its execution. Developers get money from this advertisement. This application may capture user activity and display ads accordingly. An attacker can misuse this feature of adware and can compromise the system security.Read through this article to find out more about Malware and Adware and how they are different from each other.What is a Malware?Malware is any program ...

Read More

Difference Between Cybersecurity and Network Security

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 22-Aug-2022 1K+ Views

Both these terms "cybersecurity" and "network security" are related to security measures that organizations employ to protect their data, systems, and network infrastructure from online threats. However, cybersecurity is used in a much broader sense, while network security is a subset of cybersecurity. Read through this article to find out more about cybersecurity and network security and how they are different from each other.What is Cybersecurity?Cyber security refers to the use of technology, methods, and policies to reduce the danger of cyber-attacks while also protecting the systems, networks, programs, devices, and data from unwanted access.The field of cybersecurity is becoming ...

Read More

What is Cybersecurity Mesh?

Ayushi Bhargava
Ayushi Bhargava
Updated on 16-Aug-2022 539 Views

Unfortunately, the COVID-19 outbreak provided numerous possibilities for criminal actors to prey on vulnerable, suddenly-removed personnel. In 2021, inadequate security postures will allow hackers to continue infecting businesses with ransomware, leading to data breaches, according to TechRepublic. As companies migrate to anyplace operations, cybersecurity investment is only natural to rise this year. What is Cybersecurity Mesh? Today there are two buzzwords in cybersecurity: ZeroTrust and Cybersecurity Mesh. Although the concept of a zero-trust architecture has been around for almost two decades, using it to design your security infrastructure just became popular approximately four years ago. On the other hand, Cybersecurity ...

Read More
Showing 141–150 of 875 articles
« Prev 1 13 14 15 16 17 88 Next »
Advertisements