Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Articles by Pranav Bhardwaj
Page 25 of 40
What is a Vishing Attack? Definition, Techniques, Examples
Social EngineeringCybercriminals employ social engineering as a deception strategy to persuade individuals to provide personal information. Social engineering depends on the inherent human sense of trust to steal personal and business information that may be utilised to perpetrate future cybercrimes.What is Vishing?Vishing is a sort of cybercrime that involves obtaining personal information from victims over the phone. Cybercriminals use devious social engineering tactics to persuade victims to pass up sensitive information and bank account credentials. This is referred to as "voice phishing."Vishing, like phishing and smishing, depends on convincing victims that answering the caller is the proper thing to do. ...
Read MoreWhat you need to do when your phone is lost or stolen
It's a dreadful feeling to realize your phone has been taken, and it often causes fear. As difficult as it may be, you must maintain your composure so that you can take the required steps to reclaim the device or, at the very least, protect your data. You may never see your phone again, but you'll have peace of mind knowing that your data is safe from those who would misuse it.When your phone is stolen, there are a few things you should do.Notify the AuthoritiesThe first step is to notify the authorities that your phone has been stolen. Make ...
Read MoreWhy Your Online Privacy Matters
Online privacy is important because the Internet is filled with anonymous people whose intentions vary and are unpredictable. Identity is the most valuable asset on the Internet, and hence, we need to protect it from potential imposters or hackers.This post aims to bring your attention to why online privacy is important.What is Online Privacy?Internet privacy refers to the right or obligation to protect one's personal information, whether stored, repurposed, shared with third parties, or shown through the Internet. Data privacy is a subset of internet privacy. Since the start of computer networking, privacy issues have been expressed.Personally Identifiable Information (PII) ...
Read MoreWhat is Private Browsing?
In the online world, privacy is something that is being invaded now. The Internet connects all of us and saves an increasing amount of personal data. Despite the presumption of privacy and data ownership, we have little to no influence over the systems and what is done with our data. Companies utilize our data to sway our opinions. Since online security breaches are both disruptive and costly, we must protect our online privacy by practising safe browsing methods.Private BrowsingWhen you go online through your browser, it records your browser history, website's cookies and saves form data for later autocomplete. It ...
Read MoreWhat is Man-in-the-Disk Attack?
Over the years, many security weaknesses have been discovered in Google's Android mobile operating system. When it comes to covering technology, it might feel like there's a new fault in Android's design lurking around every corner, putting consumers and developers at the risk of inventive cyber attacks.The Android operating system uses two types of storage − internal storage, which gives each app its sandbox; and external storage, accessed via a removable SD card. Man-in-the-Disk attacks use the characteristics of Android OS, notably, it allows developers to create programs that utilize external storage rather than internal storage. Let us check how ...
Read MoreWhat is KeyPass ransomware?
KeyPass ransomwareKeyPass is ransomware that targets everyone and is spread through spam emails and questionable sources. It infects computers all across the world, regardless of political or racial affiliation.KeyPass is ruthless in its selection of captive files. Many ransomware strains target specific file extensions, but this one merely targets a few folders. With the extension, keypass, all other material on the computer is converted to mumbo jumbo. It doesn't encrypt entire files; only the top 5 MB of each is encrypted.The malware leaves a TXT notice in "processed" directories, demanding that victims purchase a program and an individual key for ...
Read MoreWhat is Spear Phishing?
Spear phishing is an email or electronic communication fraud that targets a single person, company, or organization. Cybercriminals may plan to install malware on a targeted user's machine in addition to stealing data for nefarious objectives.An email appears to be from a reliable source, but it directs the unwitting receiver to a fraudulent website containing malware. These emails frequently employ deceptive strategies to capture the attention of their recipients. The FBI, for example, has cautioned against spear-phishing schemes posing as emails from the National Center for Missing and Exploited Children.Spear Phishing TechniquesFollowing are some of the common spear-phishing techniques −BEC ...
Read MoreWhat is Winternitz One Time Signature Scheme?
Winternitz One Time Signature SchemeRobert Winternitz proposed the W-OTS approach. It is thought to be quantum resilient since it uses modest key and signature sizes.It generates 32 ☓ 256 bit random private keys in total.We then have this a number of times, and a parameter (W) is used to define them.We can hash the private keys by using W = 8(2W).It generates public keys with a length of 32 256-bitsThe signature is formed by taking 8-bits at a time, subtracting the 8-bit binary int (n) from 256, then hashing the private key 256 times.Thereafter, the signature is made up of ...
Read MoreWhat is Digital Service Unit (DSU)?
Digital Service UnitA Digital Service Unit (DSU) is a piece of hardware that connects a Local Area Network (LAN) to an external communication carrier service via a Channel Service Unit (CSU).A DSU is a device with two or more ports, one designated as the WAN port and the other as the DTE port.The device translates bipolar digital signals from a digital circuit and a CSU that is compatible with the data terminal equipment to which the data is transferred.When information is sent from the DTE to the circuit, the DSU performs a similar operation in reverse.The telecommunications service that a ...
Read MoreDynamic Domain Name System (DDNS) in Application Layer
What is DDNS?The Dynamic Domain Name System (DDNS) is a protocol that provides DNS extensions that allow DNS servers to accept requests to dynamically add, update, and delete entries in the DNS database.A DDNS server can serve both static and dynamic domains at the same time, since DDNS is a functional superset of existing DNS servers.Rather than allowing any server to change its DNS records, the secure version of DDNS authenticates update requests from DDNS hosts using critical public security and digital signatures.Dynamic DNS was created to address the problem of frequent IP changes. For example, when you search for ...
Read More