General security

Honey Encryption

Current Scenario In today's world, cyber criminals often use software to brute force passwords, and some may lead to successful attacks. Since there are many

Why Passwords Won’t Die

"What I would really love to be able to do is to kill the password dead," said White House cybersecurity coordinator Michael Daniel recently. A simple and un

How Russia Controls the Internet

Russia and Internet Freedom The Russian government is increasing its pressure on social media. Many experts maintain that the population is suffering a serio

Network Time Protocol (NTP): Threats and countermeasures

In this article I am going to illustrate how NTP is vulnerable to attacks like replay-delay attacks, MITM, and a very recent attack termed as NTP DDoS (which

Domain Generation Algorithm (DGA)

Introduction We all know there have been (and still is) a lot of malware lurking around the Internet. It's quite usual today that once the victims get infect

Guerilla Psychology and Tactical Approaches to Social Engineering, Part II

Introduction So far, we have discussed techniques used in manipulation, the characteristics that social engineers possess, the cycle of social eng

A History of Malware: Part Four, 2000-2005

I remember the eager anticipation that led to the turn of century. All throughout 1999, all I ever saw or heard in the media was millenium this, millenium th

Hack-Proof Drones Possible with HACMS Technology

Introduction Unmanned Aerial Vehicles (UAVs) are one of the most flexible and useful solutions adopted by the military and private industries. Drones could b

Sinkholes: Legal and Technical Issues in the Fight against Botnets

Introduction The security community is observing a sensible increase of botnet activities, in particular of cloud-hosted botnets that are mainly based on the

DOS Deflate: Layer 7 DOS Protection Tool

DOS/DDOS stands for Denial of Service/Distributed Denial of Service. DOS or DDOS is a type of attack in which a machine or a network resource is unavailable