Firewalls are used to control the inbound and outbound traffic on a protected network. They have an ability to block and allow the internal as well as external services within the network. Before allowing access to the service, a firewall may also force the client / user to pass […]
Similarly to the real real-life situation where a GhostNet report is followed by the one on the Shadow network, these articles come as a logical continuation of the events described in the former case (GhostNet part I & GhostNet part II).
The “Shadow network” again covers the subject […]
Internet usage is growing dramatically, but the vast majority of Internet users don’t have any security backgrounds. Nor do a large majority of companies care about information security, and the severity of any attack could harm the valuable assets of these companies. They don’t give their employees security awareness […]
Introduction: Initial Detection/Mitigation Challenges
Before we go to the main topic of this article, let us take heed of two factors that exacerbate the buildup of effective defensive powers against Layer 7 DDoS attacks. First, the lack of knowledge about this matter leads an inexperienced IT security staff to take […]
Technology has changed the way that we work and operate; the flood of advances that we see daily are mind-boggling in their variety and quantity. While technological advances are necessary for the advancement of our race, they can also bring with it a slew of other problems.
The major culprit […]
I’ve already discussed SSL in my previous article. Here I’ll be explaining SSLv3. It was developed by Netscape.
General SSL Architecture
It was designed to secure end-to-end services on the internet. I’ll show that SSL isn’t a single handed protocol. It’s a layer of more than one protocol such as: […]
The Tor network is an anonymizing network that allows people to browse the web and access other services without being traced. As part of this network, there is the so-called “darknet,” servers accessible only through Tor, which host a variety of services from forums to e-mail.
It does this by […]
Screenshot from ironic Daily Mail web page, credit http://ontoberlin.blogspot.ca/2013/07/three-concerns-about-camerons-porn-plans.html
It’s too easy for politicians to make promises. Throughout the 20th century and right through the 21st to the present day, politicians around the world have made promises in order to win elections or get re-elected that have ended up broken […]
We live in a world where we’re connected to each other by a mouse click and a few keystrokes. It’s a revolution that changed the way we live our lives and run our businesses. It affects us in ways that we had never imagined before.
The internet gave us the […]
Microsoft Windows 7 is much more secure than Microsoft Windows XP. The Windows XP operating system has lots of OS vulnerabilities and the malware infection rate is also very high compared to other operating systems. According to the Microsoft Security Intelligence Report, which details in depth the state of […]
E-whoring is surely becoming one of the most common methods for beginning cybercriminals to gain easy money. E-whoring is a practice of selling pornographic content, while pretending to be the person, usually a girl, photographed. It is considered a form of social engineering in which the victim is misled […]
The term “Internet of Things” refers to the use of the Internet for monitoring, tracking, controlling, and interconnecting everyday objects. For example, home appliances can be connected to the Internet to facilitate household activities. In this context, it is worth mentioning that refrigerators that allow the users to access […]
Security plays an important role in our internet world. As the number of users on the internet increases, it’s necessary to have secure communication between the sender and the receiver. Tunnelling is the method of protecting web traffic from our local machine in order to get privacy. Once traffic […]
The NSA FoxAcid Platform
Security expert Bruce Schneier is one of the most authoritative experts who revealed that the NSA has a wide-ranging arsenal of zero-day exploits to use for cyber operations. The revelation isn’t surprising, the security community is aware of the great effort spent by governments on cyber […]
In recent years, cyber crime has grown by leaps and bounds. Cyber crime revenue grew to levels comparable to that of a state, and major security analysts agree that it’ll experience sustained growth in the coming years. In this post, I’ll analyze the impact of organized cyber crime on […]
The goal of risk management is to deliver optimal security at a reasonable cost. This article introduces quantitative risk analysis. It also describes cost/benefit analysis, risk handling, and types of countermeasures.
2. CIA Triad
Risk is related with vulnerabilities, which threaten confidentiality (C), integrity (I), and availability (A) of […]
Recent studies published on the evolution of principal cyber threats in the security landscape. They present concerning scenarios, characterized by the constant growth of cyber criminal activities.
Even though the level of awareness of cyber threats has increased, and law enforcement acts globabally to combat them, illegal profits have reached […]
The government shutdown has delayed efforts by the National Institute of Standards and Technology (NIST) to put forth their draft of the Federal Cybersecurity Framework (CSF), having missed the October release deadline and potentially threatening the February 2014 final document deadline mandated by President Obama’s cyber security executive order […]
This article explains how symmetric and asymmetric encryption work. It also describes how to build a secure mail system using these two types of encryption.
2. Symmetric Encryption
Let’s assume that Alice wants to talk to Bob. She wants to keep the message secret. Bob is the only one who […]