Sunday , November 18 2018

June, 2018

  • 11 June

    Password Attacks

    Password Attacks

    Password Attacks occur when an account is attacked repeatedly. This is accomplished by using applications known as password crackers, which send possible passwords to the account in a systematic manner. The attacks are initially carried out to gain passwords for an access or modification attack. There are several types of …

  • 10 June

    The Principles Behind Social Engineering

    The Principles Behind Social Engineering

    The Principles Behind Social Engineering: A number of principals, or elements, allow social engineering attacks to be effective. Most of these based on our nature to be helpful, or trust other in general, and to believe that there is a hierarchy of leadership that should be followed. For the exam, …

  • 9 June

    Google Promises Its A.I Will Not Be Used For Weapons

    Sundar Pichai, Google’s chief executive, at its annual Google I/O developer conference last month in Mountain View, Calif. On Thursday he laid out objectives for the company’s use of A.I. technology.

    SAN FRANCISCO— Google, reeling from an employee protest over the use of Artificial Intelligence for military purposes, said Thursday that it would not use A.I for weapons or for surveillance that violates human rights. But it will continue to work with governments and the military. These new rules were the …

  • 9 June

    Facebook Bug Changed Privacy Settings of Up to 14 Million Users

    A screen at Facebook’s developer conference last month. During testing over a few days in May, posts that millions of users thought they were creating only for family and friends were visible to the public, the company said Thursday.CreditJason Henry for The New York Times

    SAN FRANCISCO— Facebook has been on struggle for various months the perception that it did not do enough to protect the public privacy. On Thursday, The Company has again stated that they were failed to keep the information of millions of users private. As for over 14 million users of …

  • 8 June

    Understanding Hashing

    Understanding Hashing

    Understanding Hashing: Simply yet, hashing can be considered a type of one-way encryption. More accurately, it is a process that creates a scrambled output that can’t be reversed—or at least can’t be revered easily. The process of hashing takes plain text and transform it into cipher text but does so …

  • 7 June

    “Zip Slip” A Critical Vulnerability Exploited in Zip

    “Zip Slip” A Critical Vulnerability Exploited in Zip

    Zip Vulnerability: A critical vulnerability has been discovered by the security researchers which are impacting many open source coding libraries. The vulnerability is discovered in the Synk, the “Zip Slip” this vulnerability has occurred due to the way coders implement the libraries and plug-ins when decompressing an archive file. Many …

  • 6 June

    Cross Site Scripting

    Cross Site Scripting

    Cross-Site Scripting (XSS) is a type of attack that can occur in many forms, but in general they occur when data of some type enters a web application through an untrusted source (in the major of cases, a web request). Typically, this data is included as part of dynamic content …

  • 6 June

    MyHeritage Breach Leaks Million of Account Details

    MyHeritage Breach Leaks Million of Account Details

    MyHeritage Data Breach over 92 Million Users Data Leaked: Over 92 million account details from the Genealogy and DNA Testing Service the MyHeritage were found on a private server, according to a release which was made by the company on Monday. According to the release of the report, the breach …

  • 5 June

    File Systems

    File Systems

    File Systems: Several filesystems are involved in the operating systems, and from a network perspective, they have a high level of interoperability among them. Throughout the years, different vendors have implemented their own sets of file standards. Some of the more common filesystems in Windows are listed here: Microsoft FAT: …

  • 5 June

    Contents of a Contract – PTES

    Contents of a Contract – Penetration Testing

    Contents of a Contract Penetration Testing: When the initial meeting is conducted, a contract will be generated outlining the objectives and parameters of the test. Read: Intelligence Gathering – PTES Let me give you a rough idea of some of the items that may be included: System to Be Evaluated …