Blog Category


What are cyber threats?

Cyber Threats

Ransomware is a type of malware that locks users from accessing their data in their computer or any mobile device. To unlock their data, the users must pay a certain amount of ransom, this is mainly done by the payment method which uses Bitcoin. Although paying is an option in recovering your data, it is recommended not to pay because we cannot guarantee the promise of the attackers.

CSRF

Learn about the stealthy threat of Cross-Site Request Forgery (CSRF) attacks and how they exploit web application authentication. Discover how CSRF vulnerabilities can be identified and safeguarded with unique tokens, protecting critical user data in online banking, social media, and beyond.

CRLF Injection

Carriage Return and Line Feed (CRLF) are special character elements typically embedded in Hypertext Transfer Protocol (HTTP) headers and some other software code. The inclusion of these character elements is to denote an End of Line (EOL) marker. These character elements are actually very common as many protocols of the Internet Protocol (IP) Suite, such as HTTP, MIME, and NNTP, use them to discretely split the text into elements. As such, CRLF injection is when an attacker can inject a sequence of CRLF into one of these protocols or software applications; such as an HTTP stream. This is one of the attacks most common uses and as such, has the alternative names of HTTP Response Splitting and Neutralization of CRLF Sequences in HTTP Headers.

What is buffer overflow?

Buffer Overflow

Firstly, we must define what a buffer is. A buffer is an allocated section of memory which can hold anything from a string of characters to an array of integers. That being the case, a buffer overflow (or overrun) is what happens a buffer with a fixed-length receives more data than what it can handle. In this case, the extra data has to be stored somewhere and spills over into an adjacent space in memory which can corrupt or overwrite the data stored there. These overflows usually result in a system crash; however, they also create opportunities for an attacker to run some malicious code or manipulate coding errors. The success of these attacks are very high as most programming languages, such as C, C++, and Fortran are vulnerable to these types of attacks.

Encryption

Encryption of data has become an integral part of data security. Encryption can protect sensitive information and also provide secure network connections. Encryption generates a ciphertext from your original data, which can be decrypted by the intended recipient. This makes brute force attacks and Man-in-the-middle attack almost impossible.

What is TLS/SSL?

TLS and SSL

Transport Layer Security (TLS) and Secure Sockets Layer (SSL) are two cryptographic protocols used for providing secure communication over a network. The Internet Engineering Task Force (IETF) prohibited the use of SSL which led the way for TLS to succeed it. The protocols have several variations and iterations used in web browsing, email, Internet faxing, instant messaging, and voice over IP (VoIP). Websites, in particular, are known for using TLS for securing communications between their servers and web browsers. This is accomplished by TLS providing privacy and integrity to data between two communicating nodes on a network.

What is Cybersecurity?

Cyber Security

Cybersecurity deals with the protection of computer systems, networks, and data from cyber theft and damage to hardware, software and information. Cybersecurity is equally important for companies as well as individuals.

IP Address Hacked

Many readers of our website are contacting us for help on *allegedly* hacked IP address, and remedies for getting it back. One of the user is telling us his IP address used to be 64.3.x.y in Dallas and now it's 67.72.x.y located in Utah (per ip lookup); and hence his IP address is stolen, and his computer is running very slow and acting abnormal.