Recent Posts

Types of Encryption: Defined, Explained & Explored

types of encryption symmetric asymmetric AES DES

Cybercrimes are on the rise, and it’s comforting to know that there are methods to protect network security from the prying eyes of Cybercriminals as there are ways of trying to penetrate it. In this post, we will delve deeper into what is encryption and the types of encryption. Cybersecurity and protecting data are becoming more critical every day. Sectors …

Read More »

Bluetooth attacks: BlueJacking, BlueSnarfing & BlueBugging

Bluetooth attacks Bluesnarfing, Bluejacking, Bluebugging & Bluesmacking

With the rapidly growing adoption of Bluetooth by portable devices and IoT devices primarily because of the ease of use, the threats related to Bluetooths are growing manifold. Like any other technology, Bluetooth is vulnerable to several attacks, including BlueSmacking, BlueJacking, BlueSnarfing, and BlueBugging. In this post, we will be discussing common Bluetooth Attacks in detail, but before that, let’s …

Read More »

What is SSL Stripping: Defined, Explained and Explored

what is https ssl stripping

An attacker can remove the encryption from a client-server communication by using SSL stripping, aka SSL Hijacking. In this post, we will discuss SSL stripping and some related topics in detail. While SSL is used to secure the communication between the client and the server across the Internet, SSL can often provide a false sense of security. Moxie Marlinspike, a …

Read More »

What is ARP Spoofing/Poisoning & tips for security

How ARP Spoofing works

ARP Spoofing consists of a hacking technique created to impersonate entities or people on the network to obtain private information or gain access to websites and applications with a stolen session-id or credentials or launch a DoS attack. To understand what ARP spoofing is and how it works, we need to understand more about Address Resolution Protocol and its functioning. …

Read More »

What is IP Spoofing: Defined, Explained & Explored

IP Spoofing

Attackers and Cybercriminals widely abuse some inherent weaknesses in the communication protocols by using Spoofing. Spoofing is a type of cyber attack in which someone masquerades as a legitimate entity in the attempt to use a computer, device, or network to trick other computer networks. We will understand what is IP Spoofing and how to stay protected in this post. …

Read More »