How Are Wireless Networks Hacked? There are two main types of encryptions used. WEP (Wired Equivalent Privacy) Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standards ratified in 1997, its intention was to provide data confidentiality comparable to that of a traditional wiredRead More
Category: Cyber Security
Mobile Hacking – How to Hack an Android Phone?
Podcasting – Mobile Hacking – How to Hack an Android Phone? A mobile device allows communication between users on radio frequencies. It is used to send emails, multimedia sharing, and also used for internet access. In this period of time mobile has taken over desktops and computers as mobile phones now enable the user toRead More
HOW TO CHECK IF THE LINUX SERVER IS HACKED?
Symptoms of compromised server When servers are invaded by inexperienced attackers or automated attack programs, they often consume 100% of the resources. They may consume CPU resources to mine digital currencies or send spam, or they may consume bandwidth to launch DoS attacks. So the first manifestation of the problem is that the server “slowedRead More
Top 10 reasons you should go for EC-Council CEH v10
Profession in Cyber Security is evolving, the barrier to entry is rising, the demand for Skilled Cyber professionals continues to grow, but it is being refined, demanding a higher level of skill and ability. EC-Council raises the bar again for ethical hacking training and certification programs with the all-new CEH v10. The EC-Council CEHv10 is aRead More
TOP 7 CYBER SECURITY STANDARDS
When identifying the most useful best-practice standards and guidance for implementing effective cyber security, it is important to establish the role that each fulfils, its scope and how it interacts (or will interact) with other standards and guidance. Cybersecurity standards are generally applicable to all organisations regardless of their size or the industry and sectorRead More
STAY SECURE STAY AWARE AND BE SECURITY AWARE
There has been an incredible increase in the number of internet users. Earlier computers and internet were the terms used only in schools, colleges and offices. But now, a child as young as 10 years old also has his or her own Facebook account! And with the increase in internet users, has increased the needRead More
Sphere’s finest Ethical Hacking drill & certification
It was in the middle of my Computer science engineering that I got interested in the dark side of the subject i.e. hacking. This stature of interest in urged me to search for a certified hacking course. Little online research led me to Certified Ethical Hacker (CEH), most proficient and certified hacking program available. ItRead More