Monday, May 27, 2013

0

FTC probes

Posted in ,
Investigations conducted on corporations and web companies that are suspected of different violations. One of the most common is not disclosing breaches and leaks against the entity that may affect their customers.

FURTHER INFORMATION

0 comments:

Friday, May 24, 2013

0

Tailgating

Posted in ,
Also called piggybacking, this scheme is used in gaining access even without having any authorization by simply riding on another individual’s credentials. This includes faking an ID or presenting excuses in order to make the person believe the hacker is harmless.

Read full article

0 comments:

Tuesday, May 21, 2013

0

Baiting

Posted in ,
Baiting is closely similar to a trojan horse, only it is conducted in the physical world. It involves leaving an infected media (e.g. flash drive, CD, floppy disk) in a public location with the intent of damaging a network or stealing from a PC.

GET MORE INFO

0 comments:

Sunday, May 19, 2013

0

Phishing

Posted in ,
Phishing is commonly seen in email messages, a very vulnerable avenue in illegally getting private data from unsuspecting users. A hacker can pose as a legit entity with a message that will compel the user to act at once.

READ FULL ARTICLE

0 comments:

Thursday, May 16, 2013

0

Pretexting

Posted in ,
Pretexting is basically used through inventing a scenario or pretending to be someone else in order to obtain the target’s desired information. Hackers can fake their way into gaining access to birthdate, social security number and bill amounts through establishing credibility. This is typically done more effectively when the impersonator has a confident and authoritative voice and have basic knowledge of the target.

FURTHER INFORMATION

0 comments:

Tuesday, May 14, 2013

0

Social Engineering

Posted in ,
Social enginnering is a popular technique utilized by skilled hackers that is conventionally used on the phone or on a face-to-face encounter. It is called the art of handling people — the most vulnerable element in computer security — into divulging personal data and doing something that will benefit the hacker [...]

READ FULL ARTICLE

0 comments:

Thursday, May 9, 2013

0

SQLi

Posted in ,
SQL injection is a tactic used in attacking a database or a server via its front-end (e.g. website). Through putting parts of SQL statements in an entry field of the website, hackers can try and get the site to run the newly-created malicious command to the database itself, for instance, dumping its contents to a remote server under the control of the attacker [...]

CONTINUE READING

0 comments:

Tuesday, May 7, 2013

0

DDoS

Posted in ,
Distributed Denial of Service attack is an onslaught of web traffic to a particular website that is launched to cripple its server. Flooding, or using up all of the website’s bandwidth and resources is a typical tactic for hackers who want to bring down the remote host, ergo the website along with it, for a period of time [...]

CONTINUE READING

0 comments:

Sunday, May 5, 2013

0

Trials

Posted in
Landmark trials conducted against hackers and rogue groups. Out of the number of convictions already given, there are still plenty of undocumented and undetected ones that might never come to court (nor to the light).

READ MORE

0 comments:

Thursday, May 2, 2013

0

Legal

Posted in ,
Instances of legal measures taken that involves computer and network security. Also includes the legislative development that happened as hackers emerged and exploits became more widespread and damaging [...]

READ MORE

0 comments: