This article was inspired by two factors: 1) the petition filed by Anonymous on the White House’s We the People website in the beginning of 2013, demanding decriminalization and absolution for all DDoS attacks and sentences, respectively; 2) the lack of through research on that matter (although that is […]
Firewalls are used to control the inbound and outbound traffic on a protected network. They have an ability to block and allow the internal as well as external services within the network. Before allowing access to the service, a firewall may also force the client / user to pass […]
Similarly to the real real-life situation where a GhostNet report is followed by the one on the Shadow network, these articles come as a logical continuation of the events described in the former case (GhostNet part I & GhostNet part II).
The “Shadow network” again covers the subject […]
Internet usage is growing dramatically, but the vast majority of Internet users don’t have any security backgrounds. Nor do a large majority of companies care about information security, and the severity of any attack could harm the valuable assets of these companies. They don’t give their employees security awareness […]
Introduction: Initial Detection/Mitigation Challenges
Before we go to the main topic of this article, let us take heed of two factors that exacerbate the buildup of effective defensive powers against Layer 7 DDoS attacks. First, the lack of knowledge about this matter leads an inexperienced IT security staff to take […]
Technology has changed the way that we work and operate; the flood of advances that we see daily are mind-boggling in their variety and quantity. While technological advances are necessary for the advancement of our race, they can also bring with it a slew of other problems.
The major culprit […]
I’ve already discussed SSL in my previous article. Here I’ll be explaining SSLv3. It was developed by Netscape.
General SSL Architecture
It was designed to secure end-to-end services on the internet. I’ll show that SSL isn’t a single handed protocol. It’s a layer of more than one protocol such as: […]
The Tor network is an anonymizing network that allows people to browse the web and access other services without being traced. As part of this network, there is the so-called “darknet,” servers accessible only through Tor, which host a variety of services from forums to e-mail.
It does this by […]
Screenshot from ironic Daily Mail web page, credit http://ontoberlin.blogspot.ca/2013/07/three-concerns-about-camerons-porn-plans.html
It’s too easy for politicians to make promises. Throughout the 20th century and right through the 21st to the present day, politicians around the world have made promises in order to win elections or get re-elected that have ended up broken […]
We live in a world where we’re connected to each other by a mouse click and a few keystrokes. It’s a revolution that changed the way we live our lives and run our businesses. It affects us in ways that we had never imagined before.
The internet gave us the […]
Microsoft Windows 7 is much more secure than Microsoft Windows XP. The Windows XP operating system has lots of OS vulnerabilities and the malware infection rate is also very high compared to other operating systems. According to the Microsoft Security Intelligence Report, which details in depth the state of […]
It is hard to accept that nowadays, organizations get along without having an astute and decisive information system. Providing a reliable and coherence information system requires a solid security framework that ensures confidentiality, integrity, availability, and authenticity of the critical organizational assets.
Information Security Management System (ISMS) defines to setup […]
E-whoring is surely becoming one of the most common methods for beginning cybercriminals to gain easy money. E-whoring is a practice of selling pornographic content, while pretending to be the person, usually a girl, photographed. It is considered a form of social engineering in which the victim is misled […]
The term “Internet of Things” refers to the use of the Internet for monitoring, tracking, controlling, and interconnecting everyday objects. For example, home appliances can be connected to the Internet to facilitate household activities. In this context, it is worth mentioning that refrigerators that allow the users to access […]
Security plays an important role in our internet world. As the number of users on the internet increases, it’s necessary to have secure communication between the sender and the receiver. Tunnelling is the method of protecting web traffic from our local machine in order to get privacy. Once traffic […]
The NSA FoxAcid Platform
Security expert Bruce Schneier is one of the most authoritative experts who revealed that the NSA has a wide-ranging arsenal of zero-day exploits to use for cyber operations. The revelation isn’t surprising, the security community is aware of the great effort spent by governments on cyber […]
In recent years, cyber crime has grown by leaps and bounds. Cyber crime revenue grew to levels comparable to that of a state, and major security analysts agree that it’ll experience sustained growth in the coming years. In this post, I’ll analyze the impact of organized cyber crime on […]
The goal of risk management is to deliver optimal security at a reasonable cost. This article introduces quantitative risk analysis. It also describes cost/benefit analysis, risk handling, and types of countermeasures.
2. CIA Triad
Risk is related with vulnerabilities, which threaten confidentiality (C), integrity (I), and availability (A) of […]
Recent studies published on the evolution of principal cyber threats in the security landscape. They present concerning scenarios, characterized by the constant growth of cyber criminal activities.
Even though the level of awareness of cyber threats has increased, and law enforcement acts globabally to combat them, illegal profits have reached […]