2.4 What to Protect Against – Cyber Threats Wikipedia updated list: 0–9 A B C 0-day ACK scan Amplification attack Arbitrary code execution ARP poisoning Attacco a dizionario Attacco ai database Attacco di Davies Attacco informatico Attacco man in the middle Back Orifice Backdoor Bluejacking
Read more →Historical Background Since the ancient Romans it was clear the importance of critical infrastructures, so that for example they had invented a system of IPS / IDS for the protection of drinking water, raising trouts in pools far km away from Rome, sprayed by the same water conducted
Read more →I’ve seen the main facts about Security in the last months, and I still get amazing on how enterprises are being affected by several kinds of attacks. When taking a time to analyze it, we can figure out the main problem for all of these issues – a
Read more →We all use internet in our day to day life for communication, file sharing,social networking and for lot of other reasons. But we are also aware of how privacy invasion is increasing day by day with increasing of Black Hats, even some sites also stores Cookies
Read more →PGP or (“Pretty Good Privacy”) is an encryption technology that was created by Phil Zimmermann PGP can be used to encrypt anything from files to emails. Recently some email providers have adopted the technology as a privacy feature. PGP works on all operating systems and functions similarly
Read more →#vulnerability The ‘TorMoil’ vulnerability has been wreaking havoc for Mac and Linux users of the anonymity browser by leaking their real IP addresses. That is, until a patch was released 11/03 for browser version 7.0.8 Want the good news first? Windows users running Tor Browser 7.0.8 were not
Read more →Darknet and deep web are the hidden side of the Internet for General users and maybe for most professional users in the world. For browsing the Internet and any move in this great network, of course, we need to protect our privacy and keep ourselves secure as
Read more →#wikileaks The floodgates that are Wikileaks have yet to close. Another week has passed with yet another leak, the latest dubbed ‘ExpressLane,’ a tool which allows the CIA to spy on intelligence agencies such as the Federal Bureau of Investigation (FBI), Department of Homeland Security (DHS) and
Read more →With the appearance of the ‘WannaCry’ ransomware attack, we are once again faced with the reality of an unprepared and understaffed response to a large scale malware attack. The private sector companies, both national and international need to spend the time and money to harden their systems.
Read more →#exposed As if the net neutrality battle wasn’t bad enough, Verizon customers beware! It is estimated that as many as 14 million customer’s data was exposed after NICE Systems, a third-party vendor, mistakenly left the sensitive users’ details available on a server. How did this happen, you ask?
Read more →