Cyber Security Articles Articles on Online Cyber Security
Cyber Security Articles
NO.1: Kiddie Script
Kiddie script In programming and hacking culture, a script kiddie or skiddie (also known as skid or script bunny) is an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks and deface websites.
NO.2: AP (access point)
AP is a device that allows wireless devices to connect to a wired network using Wi-Fi or related standards.
NO.3: Kali Linux and Ransomware
Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools aimed at various information security tasks, such as Penetration Testing, Forensics and Reverse Engineering.
NO.4: John the Ripper
John the Ripper is a fast password cracker, currently available for many flavours of Unix, Windows, etc. Its primary purpose is to detect weak Unix passwords. It is a free and open source software distributed in code format.
NO.5: Single Point of Failure and Hackers
This is a fictional narrative by Tom Scott; however you can learn about what can happen if 'disaster strikes' in the wrong hands of someone with a 'anarchist' agenda.
NO.6: Dangers with Free Wi-Fi
If you do want to make use of public or hotel Wi-Fi here are a few suggestions to will help to reduce your risk.
NO.7: The Dark Side of the Web
92% of respondents that experienced an incident indicated the threat of the cyber security incident/s had been identified in the organisation's risk register.
NO.8: The Delimma of Privacy
We all want to have our privacy respected and at the same time, we want to be safe; if we hear about a crime, we are glad when the authorities catch the perpetrators. But the tools and rights they use may come at a cost for all of us.
NO.9: Security Locky Ransomware
Locky is the pet name of a virus that can be emailed to unsuspecting people. They open the document or file sent as an attachment and Locky strikes. What happens next:
NO.10: Pokemon Go
When people signed up to Pokemon Go through their Google account, Niantic (owner of Pokemon Go) requested full access. An app with full access can modify most of your information in you Google account (it can see content of gmail, google docs, google drive and google calendar).
NO.11: Exploit Kit
Exploit kit = software kit designed to run on web servers with the purpose of identifying vulnerabilities in the client machines that communicate with the server; once the vulnerabilities are discovered, it uploads and executes malicious code on the client.
NO.12: Security Trump free WiFi
Privacy Shield = EU-US Privacy Shield is a set of principles between US and the European Union, allowing some US companies to receive personal info from EU entities, under EU Privacy Laws.
NO.13: Security Deep or Dark?
Plunging in further, the Dark Web is a small area within the Deep Web which is intentionally hidden from discovery. The Deep web despite not being indexed is still accessible with your normal web browser if you know where to go; the Dark web however requires special software which lets you access sites that have been deliberately hidden.
NO.14: The Impotance of Passwords
Why 'Smart' objects may be a dumb idea and "my toothbrush hacked my toaster"
NO.15: Security Census Debacle
I watched in astonishment how the head of ABS explained the system had been load-tested for 1 million questionnaire sessions per hour, which was clearly inadequate.
NO.16: Has your account been hacked?
A year after the Ashley Madison hack, where 36 million account details (670,000 Australians amongst them) were published online, the full report was released.
NO.17: Apple Devices Malware - Upgrade urgently!
A German Computer group discovered they can use the telephone network to access the data of a mobile phone, find the location of a phone and collect other information. All due to a "feature" Signalling System 7 (SS7). The switching protocol is insecure.
Moderated by Monica Schlesinger: www.advisoryboardsgroup.com.au
© 2011 - 2016 Advisory Boards Group website by aml websites