Title: Cyber Attacks Explained: Network Sniffing Scope of article Since we started this series of articles on various cyber attacks, so far we have learnt about denial of service attack and packet spoofing. This month we are going to focus Read more…
Title: Cyber Attacks Explained: Man In The Middle Scope of article While we are receiving encouraging feedbacks for this series of articles, we thought of bringing yet another attack type for readers. Man in the middle attack is widely used Read more…
Title: Cyber Attacks Explained: DoS and DDos Scope of article With this article we are starting a new series to cover important cyber attacks which weaken the IT security infrastructure in organizations. With a rapid spread of internet technologies and Read more…
Title: Cyber Attacks Explained: DNS Invasion Scope of article We always read in the news about some website defaced and its pages changed to reflect some malicious content. It makes us wonder how exactly hackers can do it, and how Read more…
Title: Cyber Attacks Explained: Device Evasions Scope of article This is the last installment of the year long series of cyber attacks articles. As we know, the network infrastructures are protected by using security devices such as routers and firewalls. Read more…
Cyber Attacks Explained: Database Hacking Scope of article In this article we are going to delve into database security attacks. Database is the heart of any website or application and hacking into it can cause serious losses. First we will Read more…
Title: Cyber Attacks Explained: Cryptographic Attacks Scope of article Cryptographic solutions are used to encrypt data transmission over wireless or wired protocols. Unfortunately these techniques are proved to be vulnerable to the cyber attacks, and data can be stolen or Read more…
Title: Cyber Attacks Explained: Botnet Army Scope of article This month we are going to learn about yet another dangerous type of attack which is prevailing even in the modern computer systems. The attacks covered so far in the previous Read more…
Title: Cyber Attacks Explained: Authentication Attacks Scope of article In the previous article, we dealt with man in the middle attack whereby a hacker can steal information by intercepting network traffic. This month we are going to learn about authentication Read more…
ISO 27001 and SOC 2 COMPARISON Background There is an increased need for service organizations to provide assurance, trust and transparency over their controls to enterprises that outsource functions or processes to them (service organizations). SOC2 report – Relates to Read more…