Tag: Information Security

Tofsee backdoor malware is damm highly evasive and obfuscate that uses several Anti-Analysis techniques, with capabilities of a spambot and commonly realises Firewall modification and malicious service creation during execution to work with an injected svchost

Tofsee backdoor malware is damm highly evasive and obfuscate that uses several Anti-Analysis techniques, with capabilities of a spambot and commonly realises Firewall modification and malicious service creation during execution to work with an injected svchost. See the above images which was tested to explaint its workflow.

Read More

HOW HTTPS Work

Simply said, HTTPS is just your ordinary HTTP protocol covered in a thick coating of tasty SSL/TLS encryption goodness. It safeguards your passwords, communications, and credit card information on the wire between your computer and the servers you want to send this data to, preventing people like the infamous Eve from viewing or altering requests

Read More

Cyber Security 360 Degree Security View

Network Security •Firewall management •Network Access Control •Security Network Design •Unidentified Threat Management •Remote Access Solution •IPS / DS / PT Data Security •Data Encryption •DLP – Data Leak Prevention Infrastructure Security •DNS Security •Email Security •Unified Communications •SIEM •Log & False / Positive Analysis •Zero Day Vulnerability Tracking System Security •Windows Linux Server Security

Read More

Cybersecurity Business Guide.

#ethicalhacking #cybersecurity #informationsecurity #cyberawareness #freeeducationforall #cyberattack Backing-up your data Take regular backups of your important data, and test they can be restored. This will reduce the inconvenience of any data loss from theft, fire, other physical damage, or ransomware. Preventing malware damage You can protect your organisation from the damage caused by ‘malware’ (malicious software,

Read More