-
During the 1990s, the term "hacker" originally denoted a skilled programmer proficient in machine code and computer operating systems. In particular, these individuals could always hack on an unsatisfactory system to solve problems and engage in a...
-
Talk about a bad day: That's how you'd feel if a hacker managed to gain access to your home computer. Yes, it may seem that hackers primarily attack large companies, but the truth is that they can also target your computer just as easily.
...
-
A hacker is simply an online vandal, if you think about it. What do vandals do but damage things that don't belong to them, for no good reason other than to do it. A hacker wants to worm his way into a network of his choosing to do serious (or not...
-
With all the recent news about hackers and huge online attacks—think of the cyber attack on Sony Corp. in late 2014—it's easy to think that hackers have the upper hand in the cyber wars. But that's not the case.
One reason it seems...
-
An advance-fee fraud, also known as a 419 fraud, is a type of scam in which the victim is convinced to advance money to a stranger. In all such scams, the victim is led to expect that a much larger sum of money will be returned to him or her. The ...
-
What do you think is more likely to happen? A) Having a hacker steal your credit card information over the Internet and charging thousands of dollars on it the next day, or B) getting tricked online by a simple letter in your email box from a con ...
-
Vishing...it's indeed unusual sounding word, but there's nothing funny about it.
Vishing is a phone scam in which criminals call people with a scary sounding (but untrue) story about the compromised bank accounts and the money in it. But t...
-
Here's a true and alarming story that's also unfortunately becoming a common occurrence. Anyone reading this who works with sensitive company information should take note.
An executive as...
-
A firewall is a security device that can be a software program or a dedicated network appliance. The main purpose of a firewall is to separate a secure area from a less secure area and to control communications between the two. Firewalls can perfo...
-
Most of us are so happy to have the convenience of wireless networks that we tend to overlook the fact that they are very unsecure. For example, with a wired network, you have to be directly connected to the network. But with a wireless network—wh...
-
Most people love the convenience of going online at the local coffee shop, the airport or the hotel lobby; but most people don't know that going on the Internet in those places (called "hotspots") isn't as secure as you might think—or as safe as y...
-
If you were searching information on an IP address such as 192.168.1.1 or 10.0.0.1, you're on the right page. Because you're about to learn something that confuses almost anyone trying learning about IP addresses.
But if you read on, you'l...
-
Types of Incidents
We routinely respond to incidents that can be categorized into one of five major types:
Compromised Computing Resources, which includes:
System (OS) account compromises
User account ...
-
Part One: Overview
What is XSS?
Cross-site scripting (XSS) is a code injection attack that allows an attacker to execute malicious JavaScript in another user's browser.
The attacker...
-
Summary
Do not whitelist HTML by taking the user-provided document, removing parts of it, and returning the document. Instead, create a new document, add values to it based on the user-provided document, and return the new document. The ...
-
If you want to go into penetration testing, a home lab is a must. In this article, we’ll discuss why a home lab can be useful, the pros and cons of virtualization and the cloud for...
-
Ransomware is a type of malicious software (malware) that attempts to extort money from victims by restricting access to a computer system or files. The most prevalent form of this profit-motivated malware is crypto-ransomware, which...
-
...