Cyber Attacks Explained – Cryptographic Attacks

Title: Cyber Attacks Explained: Cryptographic Attacks Scope of article Cryptographic solutions are used to encrypt data transmission over wireless or wired protocols. Unfortunately these techniques are proved to be vulnerable to the cyber attacks, and data can be stolen or disrupted. In this article we will learn about this problem and also understand various means…

Cyber Attacks Explained – Botnets

Title: Cyber Attacks Explained: Botnet Army Scope of article This month we are going to learn about yet another dangerous type of attack which is prevailing even in the modern computer systems. The attacks covered so far in the previous articles were based on exploiting technical vulnerabilities to steal data or destroy data. Botnet attack…

Cyber Attacks Explained – Authentication Attacks

Title: Cyber Attacks Explained: Authentication Attacks Scope of article In the previous article, we dealt with man in the middle attack whereby a hacker can steal information by intercepting network traffic. This month we are going to learn about authentication attack which is a relatively new genre of hacking techniques and it is capable of…