Tuesday , December 18 2018
Home / IT Security / Black Hat (page 2)

Black Hat

Pakistan Citizens Data is No More Secured

Pakistani Citizens Data is No More Secured

Pakistani Citizens Data is No More Secured: Well, it is true from 2016 till Yet 2018 the Pakistanis Data is no more secured at all, Government fails to protect the nations private information such as Mobile Phone Number Details, NAADRA Details, PTCL Details, Calling From Someone else Phone Number To …

Read More »

Types of Attackers

Types of Attackers

Controlling access is not limited to the control of authorized users; it also includes preventing unauthorized access. Information systems may be attacked by a variety of attackers, ranging from script kiddies to worms to militarized attacks. Attackers may use a variety of methods in their attempts to compromise the confidentiality, …

Read More »

Understanding Denial of Service

Understanding Denial of Service

Understanding DoS: Denial of Service is an attack that aims at preventing normal communication with a resource by disabling the resource itself or by disabling an infrastructure device providing connectivity to it. The disabled resource could be in the form of customer data, website resource, or a specific service, or …

Read More »

Commonly Employed Threats

Commonly Employed Threats

Commonly Employed Threats: Many threats will continue to pose problems for those using the Internet, and unless you opt to stop using this resource, you must address the threats. This section explores threats targeted toward human beings and the weaknesses of human nature. What type of threats target users and …

Read More »

Social Networking To Gather Information?

Social Networking To Gather Information?

Social Networking to Gather Information: Over the last decade, some of the biggest security threats have come from the use of social networking. The rapid growth of these technologies lets millions of users each day post on Facebook, Twitter, and many other networks. What Type of Information Are They Posting? …

Read More »

Social Engineering : Identity Theft

Identity Theft

Identity Theft: One of the most prominent and rapidly evolving threats is identity theft, which falls under the heading of social engineering. According to the Federal Trade Commission, in the United States, identity theft is one of the most rapidly growing crimes over the last few years; thus, the public …

Read More »

The US Police Phone Tracking Company Hacked

The US Police Phone Tracking Company Hacked

US Police Phone Tracking: The Securus is a basically a phone tracking company that helps the police to track any phone which is within the U.S. Recently, The company was under a major attack when a hacker successfully hacked into the their system. According to Motherboard the hacker may have …

Read More »