What are the different roles within cybersecurity?

People talk about the cybersecurity job market like it’s a monolith, but there are a number of different roles within cybersecurity, depending not only on your skill level and experience but on what you like to do. In fact, Cybercrime Magazine came up with a list of 50 cybersecurity job titles, while CyberSN, a recruiting … More What are the different roles within cybersecurity?

What Does It Take To Be a Cybersecurity Researcher?

Behind the strategies and solutions needed to counter today’s cyber threats are—dedicated cybersecurity researchers. They spend their lives dissecting code and analyzing incident reports to discover how to stop the bad guys. But what drives these specialists? To understand the motivations for why these cybersecurity pros do what they do, we decided to talk with … More What Does It Take To Be a Cybersecurity Researcher?

5 Super Handy Linux Commands that Everyone Should be Aware of

Mastering the various terminal commands is a must for everybody The Linux Terminal is a very powerful tool and it’s most probably the most interesting part of Unix. There are a plethora of commands that can help us in our day-to-day life. I am a software engineer in Silicon Valley, with over 12 years of … More 5 Super Handy Linux Commands that Everyone Should be Aware of

Run Kali Linux on Windows 10

<p value="<amp-fit-text layout="fixed-height" min-font-size="6" max-font-size="72" height="80">Attention security professionals and penetration testers, believe it or not, but Kali Linux is now available in the Microsoft App store for Windows 10.  The suite of security assessment and penetration tools can natively run on Windows 10 thanks to the work of the Windows system for Linux, also known as … More Run Kali Linux on Windows 10

DNS Spoofing

What is domain name system (DNS) spoofing Domain Name Server (DNS) spoofing (a.k.a. DNS cache poisoning) is an attack in which altered DNS records are used to redirect online traffic to a fraudulent website that resembles its intended destination. Once there, users are prompted to login into (what they believe to be) their account, giving … More DNS Spoofing

How to Hack WiFi (Wireless) Network

Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to attacks. Hotspots are available in public places such as airports, restaurants, parks, etc. In this tutorial, we will introduce you to common techniques used to exploit weaknesses in wireless network security implementations. We will also look at some of the countermeasures … More How to Hack WiFi (Wireless) Network

steganography

Steganography is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination. The use of steganography can be combined with encryption as an extra step for hiding or protecting data. The word steganography is derived from the Greek words steganos (meaning hidden or covered) … More steganography

What is IP Spoofing?

IP spoofing is the creation of Internet Protocol (IP) packets which have a modified source address in order to either hide the identity of the sender, to impersonate another computer system, or both. It is a technique often used by bad actors to invoke DDoS attacks against a target device or the surrounding infrastructure. Sending and receiving … More What is IP Spoofing?

The top ten password-cracking techniques used by hackers

Understanding the password-cracking techniques hackers use to blow your online accounts wide open is a great way to ensure it never happens to you. You will certainly always need to change your password, and sometimes more urgently than you think, but mitigating against theft is a great way to stay on top of your account security. … More The top ten password-cracking techniques used by hackers

Introduction of Firewall in Computer Network

A firewall is a network security device, either hardware or software-based, which monitors all incoming and outgoing traffic and based on a defined set of security rules it accepts, rejects or drops that specific traffic. Accept : allow the trafficReject : block the traffic but reply with an “unreachable error”Drop : block the traffic with no reply A firewall … More Introduction of Firewall in Computer Network