Contact Us Today 01642 716680

Network Security

Are Wireless Networks Secure?

Wireless networks are generally a weaker alternative to a hardwire connections. Why is this? Well, if the wireless network’s traffic is open, then anyone within range can gain access which means it’s vulnerable to a ‘sniffing attack’. Modern wireless networks get around this by using encryption that requires a secret key.  How are wireless networks … Read more

When to do Penetration Testing

Regular penetration testing is becoming increasingly important. What many business owners seem to want to know, however, is when to arrange a system test. Any application that processes personal data, whether in the storing or retrieving personal data, needs to have its security tested regularly according to GDPR Article 32 (1.D). Many systems have never … Read more

The Most Common TCP Ports And Their Services

Blog art

The Most Common TCP Ports and Their Services When looking at the output of a port scan, many hackers will know which service many of them correspond to. However, this does not necessarily show how common these ports are. This post highlights which ports are ACTUALLY most common on the internet and the services they … Read more

Corporate Hacking Surges

Blog art

Corporate hacking surges are becoming more frequent. Work-from-home policies have contributed to a large surge in hacking against corporations. Many staff have made the transition to working from their homes amidst the global covid-19 pandemic. As a result we are seeing malicious activity more than double in many countries.

Tools for penetration testing

Blog art

We all know that skilled hackers are only as good as the tools they use – whether they are self-made or widely available to download, professionals rely on tools to speed up tests and complete tasks which would otherwise not be humanly possible (such as exploit’s with race conditions, for example). So, here they are; Sencode Cyber Security’s top 5 hacking tools as of February 2021.