Archive for 2015

3 Reasons Security Certifications Matter

You know the No. 1 attribute of people claiming security certifications don’t matter? They don’t have any. In my years of experience placing security pros in good jobs, it’s that simple. Having the right certifications matters, and here's why. 1..
Tuesday, 29 December 2015
Posted by Sivapriya

What are Watering-Hole Attacks ?

First detected in 2013, watering-hole attacks are one of the newest (and arguably most sophisticated) security threats facing organisations. By exploiting undetected vulnerabilities in websites and software applications, hackers can lie in wait.
Monday, 28 December 2015
Posted by Sivapriya

What is Penetration Testing and Why is It Important?

Penetration testing (otherwise known as pen testing, or the more general security testing) is the process of testing your applications for vulnerabilities, and answering a simple question: "What could a hacker do to harm my application, or organisation,.
Wednesday, 16 December 2015
Posted by Sivapriya

Ranganathaswamy Temple's Website Hacked.

Hours after the start of 20-day Vaikunda Ekadasi festival, unidentified persons hacked the official website of Sri Ranganathaswamy Temple, Srirangam, in the early hours on Saturday. The hacking came to light when devotees were trying to get information.
Monday, 14 December 2015
Posted by Sivapriya
Tag :

World’s Fastest Password Cracking Tool Hashcat Is Now Open Source

The world’s fastest cracking tool Hashcat is now open source. The company has called it a very important step and listed out the reasons that inspired them to take this step. If you are into password cracking, you might be aware of the fact.
Thursday, 10 December 2015
Posted by Sivapriya

Google Is Powering A New Search Engine That Digs Internet’s Dirty Secrets

Ever heard of Shodan and ‘appreciated’ its capabilities? Here, you are going to read about another similar, but a smarter hacker’s search engine. This search engine is called Censys and powered by Google’s infrastructure. Read more to know how.
Tuesday, 8 December 2015
Posted by Sivapriya

Spear phishing is a type of targeted email scam.

Even as organisations improve their security, and begin to filter out the huge amounts of spam emails they receive each and every day, the security landscape is changing. Phishing attacks have evolved, have a much bigger problem to contend with: Spear.
Tuesday, 1 December 2015
Posted by Sivapriya

Ethical Hacking Training and Workshop in Vellore

About : This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience.
Friday, 27 November 2015
Posted by Sivapriya

CCNA Training in vellore

About : Cisco Certified Network Associate (CCNA) validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks, including implementation and verification of connections to remote sites in a WAN. Skills.
Sunday, 22 November 2015
Posted by Sivapriya

MCITP Training in Vellore

About : The MCITP Server Administrator certification will help you develop and demonstrate your knowledge and skills in working with Server 2008 and prepare you for several different roles.The MCITP certification  builds on a combination of MCTS.
Wednesday, 11 November 2015
Posted by Sivapriya

Hardware and Networking Training in Vellore

About : Computer hardware professionals take care of the maintenance of computer hardware, while networking involves connecting a group of 2 or more computer systems for sharing data and information. The professionals engaged in R&D of computer.
Tuesday, 10 November 2015
Posted by Sivapriya

Five of the biggest hacks

1. Operation Shady RAT Last year security firm McAfee revealed details of Operation Shady RAT (RAT is an acronym for Remote Access Tool), a hacking campaign that took place over several years. The networks of 72 organisations across the world were.
Sunday, 8 November 2015
Posted by Sivapriya

A zero-day exploit : An advanced Cyber Attack defined

A zero-day vulnerability, at its core, is a flaw. It is an unknown exploit in the wild that exposes a vulnerability in software or hardware which can create complicated problems well before anyone realizes something is wrong. In fact, a zero-day exploit.
Wednesday, 4 November 2015
Posted by Sivapriya

Tips for Improving Router Security

With the recent news of router vulnerabilities, we thought it would be an excellent time to provide a few tips for improving your router security. While nothing is hack-proof in the world we live in, you can take many steps to deter attackers from.
Posted by Sivapriya

WhatsApp Found Collecting Data on Calls and Phone Numbers

WhatsApp, one of the most popular online calling apps, has been exposed by a group of researchers who identified how app’s internal protocol is storing call duration and personal information of the participants. Though, WhatsApp has never claimed.
Tuesday, 3 November 2015
Posted by Sivapriya

widget

Pageviews

Cloud Label

Blogumulus by Roy Tanck and Amanda Fazani

Blog Archive

- Copyright © 2013 Redback IT Academy -- Powered by Redback - Designed by @ Redback Studio -