Many of us might be familiar with Stuxnet, a major worm that was discovered in the Iranian nuclear facility. More recently the news about another major worm called Flame discovered...
Category: Network Security
Computer/Network Forensics is about finding out and collecting information about an online attack/security breach and presenting it in a way that is permissible in a court of law. Should IT...
In the Internet era, one doesn’t have to physically access a phone line to tap communications and spy on others. They just need to incite someone to install a piece...
Botnets are automated computer programs that install themselves on many unsuspecting victim machines and launch coordinated attacks against target systems. Spam bot is a type of botnet, but there are...
In this article, let us look at what computer worms are, some techniques used by them to infect systems, what they can do and how they spread. But before that,...
A Trojan Horse is a computer program that is attached to a genuine program / gets disguised as a genuine program to install a back-door to the user computer (enabling...
MAC Address or Media Access Control Address (physical address/ hardware address) is the permanent address embedded in NIC (Network Interface Cards) and Wireless Adapters. In this article, you can read...
An SSL Certificate might be required mainly for two reasons – 1. To validate the identity of a website / portal using digital certificates; 2. Encrypt communications between server and...
If you are a network admin, you might be aware of the various techniques used by students/ employees to gain access to blocked sites. Right from typing IP address instead...
Most of the front end applications rely on a back-end database (like MySQL, PostGRE SQL, etc) to fetch the required data while performing their tasks. Databases are no longer restricted...
Web Application Firewalls are quite different from normal packet inspection firewalls because they primarily operate in the application layer identifying and protecting web based applications/ servers from specific application based...
With so many ways/ devices to transfer data, it is becoming difficult for companies to track and prevent confidential documents/ files from being copied and sent to unwanted sources. But...
In this article, we’ll see what is two factor authentication and how USB tokens enable two factor authentication. We’ll also look at the advantages, and innovations that some vendors have...
As you might have heard, the famous blogging service WordPress.com was recently unavailable for around an hour due to a huge Distributed Denial of Service attack carried out by many...