Articles on Online Cyber Security

Cyber Security Articles                Articles on Online Cyber Security

Business Security and Online Content Auditing

Cyber Security Articles

CS.1: Kiddie Script

CS.2: AP (access point)

CS.3: Kali Linux and Ransomware

CS.4: John the Ripper

CS.5: Single Point of Failure and Hackers

CS.6: Dangers with Free Wi-Fi

CS.7: The Dark Side of the Web

CS.8: The Delimma of Privacy

CS.9: Security Locky Ransomware

CS.10: Pokemon Go

CS.11: Exploit Kit

CS.12: Security Trump free WiFi

CS.13: Security Deep or Dark?

CS.14: The Impotance of Passwords

CS.15: Security Census Debacle

CS.16: Has your account been hacked?

CS.17: Apple Devices Malware - Upgrade urgently!


NO.1: Kiddie Script

Kiddie script In programming and hacking culture, a script kiddie or skiddie (also known as skid or script bunny) is an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks and deface websites.

READ MORE OF THIS ARTICLE

NO.2: AP (access point)

AP is a device that allows wireless devices to connect to a wired network using Wi-Fi or related standards.

READ MORE OF THIS ARTICLE

NO.3: Kali Linux and Ransomware

Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools aimed at various information security tasks, such as Penetration Testing, Forensics and Reverse Engineering.

READ MORE OF THIS ARTICLE

NO.4: John the Ripper

John the Ripper is a fast password cracker, currently available for many flavours of Unix, Windows, etc. Its primary purpose is to detect weak Unix passwords. It is a free and open source software distributed in code format.

READ MORE OF THIS ARTICLE

NO.5: Single Point of Failure and Hackers

This is a fictional narrative by Tom Scott; however you can learn about what can happen if 'disaster strikes' in the wrong hands of someone with a 'anarchist' agenda.

READ MORE OF THIS ARTICLE

NO.6: Dangers with Free Wi-Fi

If you do want to make use of public or hotel Wi-Fi here are a few suggestions to will help to reduce your risk.

READ MORE OF THIS ARTICLE

NO.7: The Dark Side of the Web

92% of respondents that experienced an incident indicated the threat of the cyber security incident/s had been identified in the organisation's risk register.

READ MORE OF THIS ARTICLE

NO.8: The Delimma of Privacy

We all want to have our privacy respected and at the same time, we want to be safe; if we hear about a crime, we are glad when the authorities catch the perpetrators. But the tools and rights they use may come at a cost for all of us.

READ MORE OF THIS ARTICLE

NO.9: Security Locky Ransomware

Locky is the pet name of a virus that can be emailed to unsuspecting people. They open the document or file sent as an attachment and Locky strikes. What happens next:

READ MORE OF THIS ARTICLE

NO.10: Pokemon Go

When people signed up to Pokemon Go through their Google account, Niantic (owner of Pokemon Go) requested full access. An app with full access can modify most of your information in you Google account (it can see content of gmail, google docs, google drive and google calendar).

READ MORE OF THIS ARTICLE

NO.11: Exploit Kit

Exploit kit = software kit designed to run on web servers with the purpose of identifying vulnerabilities in the client machines that communicate with the server; once the vulnerabilities are discovered, it uploads and executes malicious code on the client.

READ MORE OF THIS ARTICLE

NO.12: Security Trump free WiFi

Privacy Shield = EU-US Privacy Shield is a set of principles between US and the European Union, allowing some US companies to receive personal info from EU entities, under EU Privacy Laws.

READ MORE OF THIS ARTICLE

NO.13: Security Deep or Dark?

Plunging in further, the Dark Web is a small area within the Deep Web which is intentionally hidden from discovery. The Deep web despite not being indexed is still accessible with your normal web browser if you know where to go; the Dark web however requires special software which lets you access sites that have been deliberately hidden.

READ MORE OF THIS ARTICLE

NO.14: The Impotance of Passwords

Why 'Smart' objects may be a dumb idea and "my toothbrush hacked my toaster"

READ MORE OF THIS ARTICLE

NO.15: Security Census Debacle

I watched in astonishment how the head of ABS explained the system had been load-tested for 1 million questionnaire sessions per hour, which was clearly inadequate.

READ MORE OF THIS ARTICLE

NO.16: Has your account been hacked?

A year after the Ashley Madison hack, where 36 million account details (670,000 Australians amongst them) were published online, the full report was released.

READ MORE OF THIS ARTICLE

NO.17: Apple Devices Malware - Upgrade urgently!

A German Computer group discovered they can use the telephone network to access the data of a mobile phone, find the location of a phone and collect other information. All due to a "feature" Signalling System 7 (SS7). The switching protocol is insecure.

READ MORE OF THIS ARTICLE

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com.au

© 2011 - 2016 Advisory Boards Group             website by aml websites

 
Advisory Board Group