DoS on Bluetooth. Reality of “Bluetooth Hacking”

In the world, there are not many things that infuriate almost everyone without exception. This is spring-autumn slush, summer hot water cut-off and schoolchildren...

Email spoofing mitigation techniques

E-mail has been one of the number one approaches of communication corporate world. Not handiest emails are used for communication a whole lot of...

Career path in Information Security

In computer science, most of the students choose his/her career as a developer such as a web developer or mobile application development....

What is Honeypot

  What is Honeypot? Honeypot is mechanism for detects cyber-criminal. It set up as a decoy to lure cyberattackers and to detect, deflect or study hacking...

Latest news