Similar to phishing, pharming is a form of cybercrime in which a website’s traffic is manipulated to steal confidential information. This concept arises from two words “phishing” and “farming.” So, how can I protect myself from a pharming attack?
Basically…
Historically, rootkits were tools that provided admin-level access to a system or network. The term rootkit is a combination of two independent words “root” and “kit.” The word root referred to the admin account whereas the word kit referred to the software…
A network sniffer is a software that is programmed to monitor data flowing over a network. The scope of these tools is to monitor data, analyze the network traffic, detect bottlenecks and other problems so that the network manager can keep the flow of the traffic smooth and…
What Is And How To Avoid Social Engineering?
May 4, 2020
Social engineering is a term used to describe the act of tricking people into revealing private information or directing them subtly to take some action through the use of technology. It is a shrewd method to take advantage of the innocent human nature to exploit people. How…
Keylogger is a brief definition for the concept and practice of digital surveillance. Alternatively, it is also known as keystroke logger and is a form of spyware. Let’s look into some measures of protection against keyloggers.
Keyloggers keep track of all your clicks…
What is Spoofing? How does it work?
April 30, 2020
The term spoofing, in cybersecurity, means some kind of impersonation attempt made by cybercriminals pretending to be a name or personality that is easily trusted by the victims. This way, targets willingly reveal confidential information to the scammers.
The scammers…
The importance of fact-checking
April 29, 2020
Daniel Kahneman, a notable psychologist and winner of the 2002 Nobel Memorial Prize in Economic Sciences introduced the concept of “WYSIATI.” It means “What you see is all there is.” Fact-checking is the process of investigating an issue to verify the facts…
What is an SQL Injection Attack? How to prevent it?
April 28, 2020
SQL Injection involves the execution of malicious SQL statements in applications using SQL databases like MySQL, Oracle, SQL Server, etc. Criminals and attackers inject malicious SQL statements to gain control over a database server of a web application. The SQL Injection…
What is Adware? How to Remove Adware from the Computer?
April 27, 2020
Many of us might have come across the term adware before but may not be clear with what it exactly is: how it impacts our systems, how it acts as a threat to cybersecurity, and most importantly how to remove adware from our computers?
Adware is a type of program that…
Exploit kits can be described as automated programs that cyber exploiters use to exploit existing vulnerabilities in the systems or apps. Secret attacks can be launched when the victims are simply web browsing. Ultimately, some kind of malware is delivered and executed…