How Hackers Get Your Password
Passwords are often the weakest part of an organisation’s or individual’s security. Often passwords are easy to guess, reused, or stored improperly, meaning a hacker with enough skill can gain access to
Passwords are often the weakest part of an organisation’s or individual’s security. Often passwords are easy to guess, reused, or stored improperly, meaning a hacker with enough skill can gain access to
In this article we will outline what is meant by physical security in the context of cyber security. We will have a look at the top ten best practices for securing your environment physically. Most of these you may think are common sense. However, you really would be amazed to discover how many reputable
GDPR gives the control of personal data back to the person it belongs to. This, in turn, ensures a safeguard for peoples’ privacy as a basic human right. It is important for companies to be aware of and adhere to as there are tough financial penalties for non-compliance.
If the name doesn’t already sound strange enough, wait until you see what you can do with Google Dorking. Before we dive deep into how we can use Google Dorking. We must first look at search engines themselves. What is a search engine? A search engine can be thought of as a behemothic database, however, … Read more
OSINT or Open-source Intelligence is a process of data collection using sources that are open to the public. This can be a wide range of origins – anything from large blogs to specific images and the metadata contained within. Everything posted online discloses some information about the poster and this is what OSINT is looking … Read more
Pegasus Project is now one of the biggest scandals, with tens of thousands of government officials and journalists being hacked and surveilled by their own governments, and other countries using malware and spyware developed by NSO group; a ‘Cyber Intelligence’ company based in Israel.
While it is true that some elite hacking tools are passed in the shadows, most of these business-breaking programs are available on the public internet and have thousands of developers. For any aspiring hacker, these applications allow them to complete tasks in seconds which, 5 years ago, would make an experienced hacker take pause. Bypassing … Read more
When developing a mobile app it is important to implement security from the outset. Future additions or alterations may not be cost-effective and can dramatically increase the risk of users having their data stolen. Mobile security is one of the most overlooked parts of cyber security and many applications are built with no considerations about … Read more
Have you been signing your life away? Remember those Terms and Conditions that nobody ever read? You know, the ones that we always used to see when we were downloading an app or signing up to subscribe to something? Sure, you do!
The Most Common TCP Ports and Their Services When looking at the output of a port scan, many hackers will know which service many of them correspond to. However, this does not necessarily show how common these ports are. This post highlights which ports are ACTUALLY most common on the internet and the services they … Read more