fbpx

Cyber Security Knowledge Base | Cybervie

virus-main
Blog

The 5 most dangerous Computer Viruses

Computer viruses are really a common occurrence in today’s Internet-connected world and range from mild inconveniences to a complete disaster. They are like the biological viruses that infect one individual and go on to multiply and spread to affect various others. They are capable of damaging systems and deleting a victim’s entire data. In this article, we’ll include general malware such as worms and Trojans as viruses and highlight the top 5 most famous and malicious computer viruses of all time.

Read More »
botnets2
Blog

Botnets: types of attacks and prevention

Botnets are a group of computers or other internet-connected devices which are controlled by a malicious user. They have become a major cybersecurity concern over the past few years. In this article, we will see the types of attacks that botnets are commonly used for and how to protect against them. If you are unaware of what exactly a botnet is and what models/architectures they use, check out the previous blog on botnets here.

Read More »
botnet
Blog

What is a Botnet and how it works?

Botnets are becoming increasingly popular among cybercriminals due to their ability to infiltrate almost any internet-connected device. Today, they pose one of the biggest threat to security systems as their use ranges from activism to sponsored disruption, where most attacks are simply profit based. They are commonly used as tools to influence elections by spreading fake news and to mine cryptocurrencies. Naturally, people are curious about what a botnet is and how it works. We got you covered…

Read More »
firewall
Blog

Firewalls and their types

Over the years, firewalls have evolved significantly to the point where no discussion of network security can take place without at least mentioning firewalls. All businesses use them as an extra layer of security to safeguard their company from cyber attacks. Any IT security enthusiast or pro must be aware of the different kinds of firewall architectures used today, such as packet filtering firewalls, circuit level gateways and, UTM firewalls.

Read More »
cloud
Blog

Cloud Security: Top 12 threats

Cloud Computing has been growing at an exponential rate and today around 70 per cent of businesses have migrated partially or entirely to the off-site storage service. Cloud provides a wide range of benefits such as lower costs, higher flexibility, automatic software updates, increased collaboration, and the freedom to work from anywhere. Companies that adopt cloud technologies without being fully aware of the security risks that are involved open themselves up for numerous technical and financial risks. In this blog, let’s take a look at the top risks that come with migrating to the cloud.

Read More »
Cybersecurity challenges in IoT
Blog

Cybersecurity challenges in IoT

The Internet of Things (IoT) can be used to interconnect various physical devices as well as virtual objects that can be accessed through the internet.IoT is rapidly growing and changing our lives. There has been a massive surge in the use of IoT devices, mainly in the homes and manufacturing sectors. IoT has invaded every aspect of our lives and everything from your water sprinkler to your security system is connected to the Internet. With the overwhelming amount of new technologies popping up every day, IoT security often tends to be overlooked which makes the users of these devices vulnerable to security threats.

Read More »
Wireshark logo
Blog

Explore Wireshark – A powerful Packet Analyser

Wireshark is one of the most robust and powerful open-source packet sniffers. It is both an interactive packet sniffing tool and analysis tool. It is the most popular packet sniffer currently, one of the reasons being it’s open-source availability and cross-platform compatibility. It can run on Windows, Linux and, Mac. User-friendly and easy to capture and view data because of the attractive graphical user interface.
Wireshark is one of the best tools for intercepting packets going across a target network, as well as read the contents of each packet in a human-readable format which can be filtered and colour-coded to meet specific requirements. It has a wide array of features which are mainly used to troubleshoot network problems and for analysis and testing of software.

Read More »
man in the middle attack
Blog

Man-in-the-middle attack | ARP spoof example

This is a very common type of cyber attack which involves eavesdropping on a network connection. The attackers usually insert themselves between a conversation, usually occurring among a web server and an application. Hackers can have various end goals for launching this attack, they may either silently observe data packets or impersonate a user and modify the data they send or receive.

Read More »
Social Engineering Attacks
Blog

Social Engineering Attacks: Techniques and Prevention

Social Engineering attacks involve manipulating the human psychology using various resources like phone calls and social media to trick the employees of certain organizations or individual users into revealing confidential or sensitive information. This attack type tends to go unnoticed by the general populace as there is not enough awareness about the methods of infiltration implemented by hackers or a legitimate solution to the problem such as investing in new technology. In this article, we will explore the life cycle of social engineering attacks and briefly describe the attack techniques and state safety measures against these attacks.

Read More »
Phishing attack demo using Kali Linux
Blog

Phishing attack demo using Kali Linux

Phishing is a form of cyber attack which typically relies on email or other electronic communication methods such as text messages and phone calls. It is one of the most popular techniques of social engineering. Where hackers pose as a trustworthy organisation or entity and trick users into revealing sensitive and confidential information.

Read More »
Is Two-factor authentication: Safe?
Blog

Is Two-factor authentication: Safe?

The two-factor authentication mechanism is used to add an extra layer of security to online accounts that usually requires two things, viz a login password and a one-time verification code. Some form of 2FA is provided by nearly all major web services throughout the world.

Read More »
Burp Suite Hacking Tool
Blog

Burp Suite Beginner’s Guide

Burp Suite is a Penetration Tester’s go-to tool when performing a Web Penetration test. It’s a java executable and hence is cross-platform. It establishes its usefulness by providing various hacking tools that impeccably work together throughout the entire Scanning and Testing process. This blog post will take you through a quick run-through of the features provided by Burp by providing a demo on DVWA(Damn Vulnerable Web App).

Read More »

Aadhaar and the Struggle

The Current Situation | Most Recent Plight | Response by UIDAI

The negative side to this is that we can’t do much to prevent any kind of breach unless we are experts in these security issues. The only thing that remains is to see how safe the data stays in the future. It may be beneficial to take as much help as possible since a hack of such crucial database can jeopardise the identity of many innocent citizens.

Read More »

Cisco Switches Hacked | What It Means For Us?

Cisco is one of the leading companies in the IT and Networking sector. A few days back Cisco faced a massive cyber attack by a group of hackers. More than 200,000 network switches belonging to the company were hacked. Many countries were affected including Iran, Russia, United States, China, and India. The data loss and the impact are not completely evident yet.

Read More »

Unsuspected Attacks | Taking the World by a Storm

High number of requests. Please try again later.
These kinds of messages can be seen significantly on the internet from time to time. Crashing of servers are incidents that are acutely seen on the internet. These incidents can happen purely due to the shortcomings of the servers set up by the website that we are trying to access. The other possibility can be a bit nerve wracking and it is known as Denial of Service attack.

Read More »

Loopholes Putting Our Identities on Stake | Flaws in the Whats App Security

In this 21st century we end up trusting our gadgets more than ourselves. It is definitely convenient to have a digital assistant. It is indeed relaxing that we don’t have to carry around all the data in our head all the time. Services that remember our passwords for us, saves our data on our devices so that we can access them anywhere anytime are just some of the instances of how easy things have become.

Read More »
Work in Cyber Security
Blog

What is it like to work in Cyber Security?

IT is easily one of the fastest growing industries in the world, but deciding to make it your new career isn’t easy. Working in cybersecurity may sound thrilling and glamorous on the surface, but there’s a lot more to it. Looking for a job to enter this domain but not sure how it’ll be or if it’s what you’re looking for? In this blog post we list down all the pros, cons and, frank observations that you need to know before you decide to take the plunge.

Read More »
Essential skills to get a Cyber Security Job
Blog

Essential skills to get a Cyber Security Job

With the frequency and severity of cyber attacks continuing to rise, Cybersecurity is becoming more important every day. No organization is safe from the looming danger of data breaches that have now become a daily occurrence. It is a known fact that there is a shortage of Cybersecurity professionals.

Read More »
Beginner tips to learn Cyber Security
Blog

Beginner tips to learn Cyber Security?

Mainstream media has highly popularised the InfoSec industry by usually portraying the hackers and the righteous guys in a high stake cat and mouse game. In actuality, Cyber Security is not all fun and games but is a broad field where even mastering one of them is a long and continuous process.

Read More »
Red Team vs Blue and Purple Teams in Cyber Security
Blog

Red Team vs Blue and Purple Teams in Cyber Security

The online applications and services that we use need to be safeguarded against attackers in order to protect our private and sensitive information. Small companies, as well as large-scale corporations, are inclined to think about Protection, Damage control and, Reaction when they consider Information Security from a defensive point of view.

Read More »
Ethical Hacking Tools
Blog

06 Major Ethical Hacking Tools

Hacking Tools are computer programs and scripts that help you find weaknesses and exploit them in Computer systems, Web applications, Servers and Networks. Automatic hacking tools have changed the world of Penetration Testing and Ethical Hacking. The hacking tools used by Ethical Hackers need to be Fast, Reliable, Easy to use and, Extensible. Here we discuss the top Hacking Tools that every present-day Ethical Hacker should be aware of, whether they are new to the field or a veteran.

Read More »
Types of hackers
Blog

Types of hackers from Good to Bad

The term Hacker is inherently misused and not fully understood. Whenever people hear the word hacker, they immediately visualise a stereotypical 1980’s movie where a hacker is an evil criminal who is conspiring against the people and the government.

Read More »
Cyber Security Careers
Blog

How to Build a Career in Cyber Security?

Cyber Security is one of the rapidly growing industries nowadays. It is indeed a very exciting field to take up at the present along with lucrative earning opportunities. Building a Cyber Security Career may be a long journey but it is indeed worth it and a valuable asset.

Read More »