Security+
-
AT&T Collaborates on NSA Spying Through a Web of Secretive Building in the US
A new report from The Intercept sheds light on the NSA’s close relationship with communications provider AT&T. The Intercept has…
Read More » -
Confidentiality and Strength
Confidentiality and Strength: One of the major reasons of implement a cryptographic system is to ensure the confidentiality of the…
Read More » -
Password Attacks
Password Attacks occur when an account is attacked repeatedly. This is accomplished by using applications known as password crackers, which…
Read More » -
Understanding Hashing
Understanding Hashing: Simply yet, hashing can be considered a type of one-way encryption. More accurately, it is a process that…
Read More » -
Cross Site Scripting
Cross-Site Scripting (XSS) is a type of attack that can occur in many forms, but in general they occur when…
Read More » -
File Systems
File Systems: Several filesystems are involved in the operating systems, and from a network perspective, they have a high level…
Read More » -
Monitoring System Logs
Monitoring System Logs: In addition to network monitoring, you must monitor the event logs. Event Logs are system logs that…
Read More » -
Application Security
The Application Security: There are a number of issues to be cognizant of when it comes to application security. Many…
Read More » -
Intelligence Gathering – PTES
Intelligence Gathering – Penetration Testing Execution Standard: Once a plan is in place and proper preparation has been successfully completed,…
Read More »