A Replay Attack is categorized as a network-based security hack and it is built on interception and re-transmission of data. Its main aim is to get system access along with the data stored and transmitted from it.
What Do You Mean By A Replay Attack?
A Replay attack…
A TCP SYN Flood attack is categorized as DoS (Denial of Service attack). It is undeniably one of the oldest yet the most popular DoS attacks that aim at making the targeted server unresponsive by sending multiple SYN packets.
During the attack, the TCP connections are…
A Macro virus is a harmful PC threat that attaches its code to the pre-installed macro operation of a computer system including Microsoft Word, Excel, Spreadsheets, etc. The virus gets embedded in the document macro and automatically launches whenever you open the document…
What is a Dictionary Attack and How to Prevent it?
July 3, 2020
In a Dictionary attack, cyber-criminals use password guessing techniques to bypass the security walls of a password-protected device. In this, hackers use numerous combinations of usernames and passwords to guess the correct credentials.
A series of dictionary words are…
The Teardrop Attack belongs to the family of DoS (Denial of service) attacks and aims at causing a system crash by putting excess load.
TCP/IP fragmentation codes are the main targets of a Teardrop Attack. Its working methodology involves overlapping the fragmented…
The Stealth virus is a highly dangerous virus whose detection is quite difficult. It can infect your device in several ways including email attachments, infected weblinks, application download from third-party websites etc.
It usually hides in the corners of your device…
A Smurf Attack aims at making your device inoperable by flooding it with numerous ping messages. It belongs to the category of DDoS attacks that exploit the security voids in the ICMP and IP creating high network traffic.
Important Terms
IP: Internet ProtocolICMP…
Important Security Tips for Safe Computing
June 29, 2020
In this article, we’ll disseminate a few security tips, the must-follow steps to protect yourself from malware and other digital threats.
If you think that you can never be a victim of cyber-crime, it’s probably a good time for you to reconsider. With…
What is Ping of Death Attack? Prevention and Mitigation
June 26, 2020
A Ping of Death attacks works on the DOS (Denial-Of-Service) methodology and results in permanent or temporary device freezing issues. The modus-operandi used by its developer aims at sending large packets to the targeted machine making it crash or freeze.
The packets…
Important Security Tips for Working From Home
June 25, 2020
The outbreak of COVID-19 has put everyone in a lockdown situation forcing them to work-from-home on a full-time basis. Working from home is an unfamiliar concept to most of the people, and can put even the most prepared people in unavoidable circumstances. Here are a few…