What do you think of accessing blocked sites & hiding IP address using...
If you are a network admin, you might be aware of the various techniques used by students/ employees to gain access to blocked sites. Right from typing IP address instead of URL, using URL shortener’s,...
View ArticleWhy is an SSL Certificate required?
An SSL Certificate might be required mainly for two reasons – 1. To validate the identity of a website / portal using digital certificates; 2. Encrypt communications between server and browser (or)...
View ArticleWhat is – MAC Address, MAC Filtering, MAC Spoofing
MAC Address or Media Access Control Address (physical address/ hardware address) is the permanent address embedded in NIC (Network Interface Cards) and Wireless Adapters. In this article, you can read...
View ArticleWhat is a Trojan Horse in Computer Networks and how to protect yourself from it?
A Trojan Horse is a computer program that is attached to a genuine program / gets disguised as a genuine program to install a back-door to the user computer (enabling the attacker to take control of...
View ArticleWhat are Network/ Internet Worms & A short story of Stuxnet
In this article, let us look at what computer worms are, some techniques used by them to infect systems, what they can do and how they spread. But before that, let us read a short story of the most...
View ArticleBotnets – What are botnets, what can they do & how to protect against them
Botnets are automated computer programs that install themselves on many unsuspecting victim machines and launch coordinated attacks against target systems. Spam bot is a type of botnet, but there are...
View ArticleWhat can Spyware do and How can one Protect against Spyware?
In the Internet era, one doesn’t have to physically access a phone line to tap communications and spy on others. They just need to incite someone to install a piece of software (called spyware) and can...
View ArticleComputer and Network Forensics – An Introduction
Computer/Network Forensics is about finding out and collecting information about an online attack/security breach and presenting it in a way that is permissible in a court of law. Should IT managers be...
View ArticleFlame Virus (Worm) – Some good resources to read to know more
Many of us might be familiar with Stuxnet, a major worm that was discovered in the Iranian nuclear facility. More recently the news about another major worm called Flame discovered in Iranian oil...
View ArticleA Honeypot can be used as a Network Security tool
What is a honeypot? A honeypot is an isolated and vulnerable system that is deliberately kept in the network in order to attract attackers, study their method of attacks and protect the actual systems...
View ArticlePenetration Testing – An Introduction
Penetration Testing is the name given to methodologies used to test networks, applications, and even people, for security holes. It is done by trained professionals who identify security...
View ArticleBook Review: Malware, Rootkits & Botnets – A Beginner’s Guide
Malware, Rootkits & Botnets – A Beginner’s Guide, written by Christopher C. Elisan, offers a good introduction to information security. Written in a simple language, this book should be useful to...
View ArticlePublic Cloud: What Security Can your Business Expect?
Security concerns are often cited as a reason for not hosting enterprise applications/data on the public cloud. In this post, let’s have a glimpse at the level of security offered by AWS, a prominent...
View ArticleEncrypted RDP for Non-Mobile Worker Remote Access?
When we think of remote access, we think of VPN. But is VPN the only option? Why not use encrypted RDP, especially for giving temporary remote access to non-mobile workers? VPN is Virtual Private...
View ArticleNetwork Sandbox for Zero-day Attacks & Unknown Malware
Network Sandbox is a technology that enables organizations to analyze, identify and block zero-day attacks and unknown malware, even before a signature is created for them. Most protection methods...
View ArticleRansomware – An Introduction
What is Ransomware? Ransomware is a malware/malicious software program designed to block or disable access to the data your computer. The program displays a full-screen message on your screen claiming...
View ArticleWhat is DNSSEC and Why is it Required?
DNSSEC (Domain Name Systems Security Extensions) is a set of protocols added to the DNS protocol to enhance security. It serves the following main functions – Authenticates and certifies that the DNS...
View ArticleInternal Network Segmentation Firewalls: What are these?
What are Internal Network Segmentation Firewalls? Most firewalls are placed on the edge of the network, and with a good reason. But what happens once a threat/malicious code passes through into the...
View ArticleMedia Player Apps Can be used to Hack into a System?
Check Point, in its recent blog post, has reported a vulnerability in existing media player apps like VLC, Kodi, etc. using which an attacker can try and take complete control over a user’s system –...
View ArticleHow to Identify and Prevent Web Scraping Bots?
What are Web Scraping Bots? There are computer programs that automatically visit a website and copy information like content, price, etc. on some/all web pages and pass it on to its owners. These are...
View Article
More Pages to Explore .....