Phases Of Hacking
How is it that these attackers, whether they are security consultants or criminals, what do they do? Well, there are some phases of hacking…
How is it that these attackers, whether they are security consultants or criminals, what do they do? Well, there are some phases of hacking…
What is hacking? Hacking in the broadest sense, is the ability to take a complex system and use it in a way for…
An Indicator of Compromise is like a clue, I see a magnifying glass here. An artifact, a little piece of forensic data that’s…
So, you know, everyone has their own style, right? The way they dress the way they walk what they do. And if…
The figure shows the cyber kill chain. It sounds mysterious but actually it’s not that mysterious. We have reconnaissance, weaponization, delivery, exploitation, installation, command, and…
What is information security? While we have information, information is actually different than data. Information has meaning, and as such…
One of the biggest threats to watch out for on social media is fraud perpetrated by people who aren’t who…
Network Mapper, otherwise known as “Nmap,” is a powerful open-source program, perfect for conducting reconnaissance and enumeration. Yes, Nmap is…
Which Ports Are Usually Open By Default? There are a LOT of ports. A port number can be anything from…
Even with the virtual assistant turned off, most of us have suspected our mobile phone is listening to our private conversations. While…