When it comes to cryptography in the context of industry standards such as HTTPS (or SSL/TLS) or the end-to-end encryption of chats, one can assume that the encryption methods used are relatively secure and guarantee integrity. This is where homomorphic encryption differs significantly from conventional methods: For homomorphic encryption to work, the cipher suites must be designed to be … [Read more...]
What is SMS Phishing (Smishing)?
SMS phishing, also known as smishing uses text messages to deliver messages to bait people to expose their details. Smishing attacks typically invite the user to click on a landing page. The landing page is designed to extract the private data and credentials to other websites. Several factors have made smishing an attractive option to bait innocent peoples. First, sending bulk messages is … [Read more...]
Interesting Facts About Cyber Attacks
Misconceptions about attack methods, targets, or intentions of cybercriminals are common. This harms corporate security. A popular saying from IT security professionals is that there are two types of companies - those that have been hacked and those that don't yet know. The fact is that cyber-attacks are one of the most essential threats to our economy today. But even though cybercrime has become … [Read more...]
EZVIZ C6CN IP Camera Review and Tips
EZVIZ C6CN is a motorized indoor internet camera which supports single unit usage as well as NVR, local storage, cloud storage, over-the-internet remote viewing and has video management software for Android (you'll get on Google Play) and Microsoft Windows (EZVIZ Studio is the name of their Windows app). EZVIZ is a sub-brand of HIKVision to deliver "smart" cloud-based security cameras. You can … [Read more...]
What is Cyber Insurance?
Estimating and securing IT risks as best as possible is at the top of the agenda for IT and security officers in many companies. Numerous insurers now offer cyber insurance for the companies against theft, hacking, data destruction, extortion, denial of service attacks and so on. Risks under these insurance titles are typically excluded from traditional policies or are not specifically defined in … [Read more...]
What is Asymmetric Cryptography?
Asymmetric cryptography or two-key cryptography is the cryptographic method that a pair uses of keys for sending messages. The two keys belong to the same person who will receive the message. One key is public and can be delivered to anyone, the other key is private and the owner must keep it so that no one has access to it. In addition, cryptographic methods guarantee that this key pair can only … [Read more...]
Let’s Encrypt Effect : Huge Slash of Price of SSL/TLS DV and EV Certificates
It Was Probably Obvious When Let’s Encrypt Project Was Launched. In Reseller Market, There is Huge Slash of Price of SSL/TLS DV and EV Certificates, Which is Up to 70% of Official Price. Official Pricing However, Mostly Unchanged. Additionally, there has been services to deliver DV and EV certificates in Monthly plan like Software-as-a-Service. If you have 4+ old Geo Trust like SSL/TLS certificate … [Read more...]
Mirai Botnet : A Risk of Servers to IoT Devices
More and More Information Coming Out About Mirai Botnet. Mirai Botnet Was Risk of Servers and Also IoT Devices Including Some Consumer Grade Products. On October 21st 2016, Dyn was hit by a DDoS attack that created serious problems : the collapse of Dyn made unreachable for many hours the portals of the most notes from Silicon Valley (and more), from Amazon to Airbnb, PayPal, Twitter, Facebook … [Read more...]
How To Install Metasploit on Ubuntu 16.04 LTS To Test Security
White hat or Black hat, hacking demands good grasp of all sysadmin works. The usage style we show on this website are intended for testing security of own servers - that is white hat way. We have a list of essential security tools for GNU/Linux servers. Metasploit framework needs Ruby, Postgre SQL, Java etc. Here is how to install Metasploit on Ubuntu 16.04 LTS to test security of servers. Off … [Read more...]
How To Install, Configure & Run Malware Detect (maldet) On Linux Server
Previously, we talked about a bunch of anti malware for GNU/Linux servers. That list essentially was for the purpose of our future guides around those softwares. Here is a step by step complete guide on how to install, configure & run malware detect (maldet) on linux server with Ubuntu server commands as example. Reader needs not much experience to get used and work. Again - Linux Malware … [Read more...]
List Of Anti Malware For GNU/Linux Server
We noticed that we need to deliver guides around some known things which are possibly not known to the new users. Somehow, many we missed to talk about them since the year 2010. Anti Malware is not fully correct phrase for Linux but the meaning is obvious. Here is a usable list of Anti malware for GNU/Linux server. Malware are programs which aims to disrupt the normal operation of a server. … [Read more...]
- 1
- 2
- 3
- …
- 50
- Next Page »