Skip to content
Home » Archives for Helga » Page 5

Helga

sniffer packets

Sniffer Packets – What is it?

Sniffer is a program or device that intercepts and analyzes network traffic. This process is also called traffic analysis. What Is a Packet Sniffer? If you briefly explain how they work and what the sniffers are, then you need to imagine a hidden camera in the corner of the room that records everything you see. And whoever owns that camera… Read More »Sniffer Packets – What is it?

smurf attack

Smurf Attack: What Is a Smurf Attack?

Smurf attack is a specific type of distributed denial of service attack (DDoS). It supposes flooding a target server with spoofed IP and ICMP packets. As a result, the target server becomes inaccessible. The name comes from DDoS.Smurf malware tool, which was widely used in the 1990s. A small ICMP packet generated by a malicious tool can cause considerable damage… Read More »Smurf Attack: What Is a Smurf Attack?

Smishing Attacks: Tips for protection

Smishing Attacks: Tips for protection

Smishing is a kind of a phishing attack that aims to steal the privacy of a user and distribute malware on their device. This attack works using text messages, which deceptively inform users about something important. This attack supposes that user should follow the link or send something back instead. Smishing has long been successful for scammers. Users often trust… Read More »Smishing Attacks: Tips for protection

ipv4 vs ipv6

IPv4 vs IPv6 NEW

IPv4 vs IPv6: Comparison of Internet Protocols Thanks to the Internet Protocol (IP address), computers and devices can exchange data. There are two versions of IP today – IPv4 and IPv6. Both protocols are used to identify devices connected to the network, but they have some differences. Below you will learn the differences between IPv4 and IPv6, as well as… Read More »IPv4 vs IPv6 NEW

Wireless networks

Wireless Networks Protection Standards: WEP, WPA, WPA2 and WPA3

Since the early history of wireless networks they were generally considered to be insecure compared with wired ones. But since the popularity of wireless networks has risen much higher than wired networks, the need for rules on how to secure wireless networks has also risen high. That’s where Wi-Fi security protocols appeared to enable the security and effectiveness of wireless… Read More »Wireless Networks Protection Standards: WEP, WPA, WPA2 and WPA3

NSA releases advices on securing PowerShell environment

NSA Advises On How To Secure Windows Devices With PowerShell

The National Security Agency (NSA) and several other cyber security partner agencies recently shared an advisory where they recommended to system administrators to use PowerShell in order to prevent and also detect all the malicious activities going on any Windows machine. PowerShell (or shortly PS) is Microsoft’s automation and configuration tool. Hackers often abuse it, mostly at stages after gaining… Read More »NSA Advises On How To Secure Windows Devices With PowerShell

Penetration Testing

Penetration Testing: What’s The Thing

Every company and organization worldwide invests a lot of money and spends significant time on cyber security. Nowadays, regular cyber security checks play a vital role in managing different workspaces. Penetration testing helps review the cybersecurity readiness of your company or organization from various cyberattacks. Pen tests allow companies and organizations to see the possible weaknesses in their cybersecurity defense… Read More »Penetration Testing: What’s The Thing

Phishing Scams

Common Phishing Scams

Phishing is one of the most common methods of data leakage. Among the digital threats, phishing attacks play almost no key role. The number of phishing attacks is growing significantly and is a big threat to large organizations worldwide. Therefore, most companies and organizations should know what phishing looks like, how hackers carry it out, and what subtypes to divide.… Read More »Common Phishing Scams

WannaCry Ransomware: Interesting Details About The Threat

WannaCry Ransomware: Interesting Details About The Threat

WannaCry ransomware is the first ransomware that attacked companies across the entire globe on May 12, 2017. It was aiming at thousands of computers in 150 countries. Among WannaCry targets were Honda, the University of Montreal, FedEx, and the National Health Services of England and Scotland. This ransomware also goes by the names like Wanna Decryptor, WannaCryptor and WannaCrypt. For… Read More »WannaCry Ransomware: Interesting Details About The Threat