In the world, there are not many things that infuriate almost everyone without exception. This is spring-autumn slush, summer hot water cut-off and schoolchildren with portable Bluetooth speakers. And if with the first two natural disasters practically nothing can be done, then with the third it is quite possible to fight, and almost without crime. How? We’ll talk about … [Read more...] about DoS on Bluetooth. Reality of “Bluetooth Hacking”
Tutorials
Email spoofing mitigation techniques
E-mail has been one of the number one approaches of communication corporate world. Not handiest emails are used for communication a whole lot of personal records is also shared through emails. Every day around 269 billion of emails are exchanged across the globe. Those numbers are massive enough to intrigue hackers and cyber-bullies to apply emails as their target for … [Read more...] about Email spoofing mitigation techniques
Career path in Information Security
In computer science, most of the students choose his/her career as a developer such as a web developer or mobile application development. But, there are lots of job profile after computer science. Such as Bussines Developer Executive, Human Resource, Technical Engineer, Web Developer, Application Developer, Network Administrator, Penetration Tester, etc. In this blog, I am … [Read more...] about Career path in Information Security
What is Honeypot
What is Honeypot? Honeypot is mechanism for detects cyber-criminal. It set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts in order to gain unauthorized access to information systems. How honeypots work in the enterprise? Detect the attacker before breach : HoneyPot detects unusual traffic in the network. Data that enters and … [Read more...] about What is Honeypot