Network security

It Is Simple, If I Can Compromise Your Wireless Router, I Own Your Network! Period!

It is convenient, it is a necessity, and some devices give you no other option: wireless networking is all around us. We all use wireless networks on a dail

Intrusion Prevention System: First Line of Defense

In the past few years, advancements in technology have grown hand in hand with a substantial increase in hacking and cyber espionage. The whole world is deep

Analysis on pBot - a PHP IRC Bot that has Malicious Functions

For IRC enthusiasts like me, it's just common to encounter IRC bots in underground channels that have integrated functions like port scanning, nmap, SQL In

Playing by the Rules: Performing Firewall Audits

Anyone who has ever managed a firewall will know that all too often it's a one way street. From the moment the device is plugged into the network, rules are

Traffic Anomaly Detection – TCP and DNS

Ever since the computer and the critical data it holds came into headlines, so did the malicious programs, attacks and the threat landscape. We have thousand

AlienVault OSSIM Review - Open Source SIEM

Introduction As logs never lie, it's very important to aggregate and analyze the internal and external network logs constantly so that companies can prevent

The Importance of Securing a Linux Web Server

With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux ba

Top 10 Tips for Securely Managing Your Employee’s BYOD

Overview: The BYOD (Bring Your Own Device) phenomenon is expanding at an incredible rate. It is something that affects every business, from the smallest to t

Wi-Fi Security: The Rise and Fall of WPS

Wireless local-area networks which are also referred to as WLANs or Wi-Fi are prevalent these days. They are so popular that they can be found installed in o