Cyber Attacks Explained – Wireless Attacks

Title: Cyber Attacks Explained: Wireless Attacks Scope of article Wireless networks are everywhere, from home to corporate data centers. They make our lives easy by avoiding bulky cables and related problems, while ensuring seamless connectivity of network nodes. As it is a benefit, there is certainly a threat which comes along with that. Wireless networks…

Cyber Attacks Explained – Web Exploitation

Title: Cyber Attacks Explained: Web Exploitation Scope of article Websites are no longer a means to have internet presence today, but are also used for commercial transactions and sensitive data transfers. Wider usage of internet helps hackers gain more knowledge on vulnerabilities and exploitation techniques than before. Various studies by security experts show that hacking…

Cyber Attacks Explained – Packet Spoofing

Title: Cyber Attacks Explained: Packet Spoofing Scope of article Last month we started this series of articles to cover important cyber attacks which impact critical IT infrastructure in organizations. The first one in the series was the denial of service attack which we discussed in details. This month we are going to learn about the…

Cyber Attacks Explained – Packet Crafting

Title: Cyber Attacks Explained: Packet Crafting Scope of article In the previous articles of this series we covered common attacks found in most of the infrastructure vulnerability exploitation scenarios. This article takes a step forward, in terms of describing a technically advanced attack which can badly impact networks because it is tough to detect it.…

Cyber Attacks Explained – Network Sniffing

Title: Cyber Attacks Explained: Network Sniffing Scope of article Since we started this series of articles on various cyber attacks, so far we have learnt about denial of service attack and packet spoofing. This month we are going to focus on a wider hacking approach called as network sniffing, which is used very commonly by…

Cyber Attacks Explained – Man In The Middle Attack

Title: Cyber Attacks Explained: Man In The Middle Scope of article While we are receiving encouraging feedbacks for this series of articles, we thought of bringing yet another attack type for readers. Man in the middle attack is widely used and highly favored by the attackers. Unfortunately many system administrators who should protect their infrastructure…

Cyber Attacks Explained – DoS and DDos

Title: Cyber Attacks Explained: DoS and DDos Scope of article With this article we are starting a new series to cover important cyber attacks which weaken the IT security infrastructure in organizations. With a rapid spread of internet technologies and applications, there is an unfortunate rise in preying eyes to hack into systems. These attacks…

Cyber Attacks Explained – DNS Invasion

Title: Cyber Attacks Explained: DNS Invasion Scope of article We always read in the news about some website defaced and its pages changed to reflect some malicious content. It makes us wonder how exactly hackers can do it, and how do we prevent our infrastructure. Today we are going to learn about DNS (domain name…

Cyber Attacks Explained – Device Evasions

Title: Cyber Attacks Explained: Device Evasions Scope of article This is the last installment of the year long series of cyber attacks articles. As we know, the network infrastructures are protected by using security devices such as routers and firewalls. So far it was believed that such devices provide enough means towards securing the perimeter.…

Cyber Attacks Explained – Database Hacking

Cyber Attacks Explained: Database Hacking Scope of article In this article we are going to delve into database security attacks. Database is the heart of any website or application and hacking into it can cause serious losses. First we will discuss possible database specific attacks and then talk about various means to protect infrastructure from…