Recent Posts

Bluetooth attacks: BlueJacking, BlueSnarfing & BlueBugging

Bluetooth attacks Bluesnarfing, Bluejacking, Bluebugging & Bluesmacking

With the rapidly growing adoption of Bluetooth by portable devices and IoT devices primarily because of the ease of use, the threats related to Bluetooths are growing manifold. Like any other technology, Bluetooth is vulnerable to several attacks, including BlueSmacking, BlueJacking, BlueSnarfing, and BlueBugging. In this post, we will be discussing common Bluetooth Attacks in detail, but before that, let’s …

Read More »

What is SSL Stripping: Defined, Explained and Explored

what is https ssl stripping

An attacker can remove the encryption from a client-server communication by using SSL stripping, aka SSL Hijacking. In this post, we will discuss SSL stripping and some related topics in detail. While SSL is used to secure the communication between the client and the server across the Internet, SSL can often provide a false sense of security. Moxie Marlinspike, a …

Read More »

What is ARP Spoofing/Poisoning & tips for security

How ARP Spoofing works

ARP Spoofing consists of a hacking technique created to impersonate entities or people on the network to obtain private information or gain access to websites and applications with a stolen session-id or credentials or launch a DoS attack. To understand what ARP spoofing is and how it works, we need to understand more about Address Resolution Protocol and its functioning. …

Read More »

What is IP Spoofing: Defined, Explained & Explored

IP Spoofing

Attackers and Cybercriminals widely abuse some inherent weaknesses in the communication protocols by using Spoofing. Spoofing is a type of cyber attack in which someone masquerades as a legitimate entity in the attempt to use a computer, device, or network to trick other computer networks. We will understand what is IP Spoofing and how to stay protected in this post. …

Read More »

Data Loss Prevention: DLP limitations and how to bypass?

how to bypass DLP solution

DLP, as you might be aware, stands for Data Loss Prevention or Data Leaks prevention. It’s a purpose-built solution to protect sensitive information from moving out. DLP solutions have been around for over a decade and a half and have come a long way, yet it’s surprisingly easy to bypass the DLP solution. We can define the DLP solution as …

Read More »