Home Cyber Knowledge

Cyber Knowledge

penetration

What is Penetration Testing or Pen Testing in Cyber Security?

0
What is penetration testing? Penetration testing (or pen testing) is a security practice where a cyber-security specialist tries to find and exploit vulnerabilities in a computer system. The purpose of this simulated...
famous-sql-attack

Famous SQL Injection Attacks in Cyber World

0
SQL Injection can be applied in an array of ways to create serious problems. By levering SQL Injection, an attacker could neglect authentication, access, change, and delete data inside a database....
vulnerability-scanning

What is Vulnerability Scanning?

0
Vulnerability scanning or vulnerability assessment is a systematic process of finding security loopholes in any system addressing the potential vulnerabilities. The purpose of vulnerability assessments is to prevent the possibility of unauthorized...
different-types-keylogger

Types of keylogger or Keystroke Logger

0
There are two types of keyloggers, based on the process applied to install and control keylogger. Software-based keylogger and another one is hardware-based keylogger 1. Software-based keyloggers Software-based keyloggers are programs that...
social-engineering

What is Social Engineering Threat and How its work

0
Social engineering attack is the art of manipulating people so they give or share private information. The kinds of information these criminals are trying can vary, they are regularly trying to...
avoid-social-engineering

How to Avoid Social Engineering Threats

0
Security experience education is the number one way to stop social engineering attacks. People should be conscious. They should know that social engineering exists. Also familiar with the various usually...
sql-injection

What is SQL Injection Attacks and How it works?

0
SQL Injection (SQLi) is a kind of injection attack that makes it reasonable to perform malicious SQL records. These records control a database server behind a web application. Attackers can use...
zero-day-attacks

What is Zero Day Attack and how it works?

0
A zero-day vulnerability is a flaw. It is a remote exploit in the wild that presents a vulnerability or weak point in software or hardware. It can create difficult problems well...
keylogger

What is Keylogger and Keystroke Loggers?

0
What is a keylogger? At its most primary explanation, a keylogger or Keystroke Loggers is a function that preserves or keystrokes on a computer. Taken at this basic level, a keylogger...
cyber-security-challenge geeksogle

The Most Challenges Of Cyber Security

0
For effective Cyber Security, an organization demands to regulate its efforts throughout its whole information system. Elements of cyber include all of the following: 1. Network-security Network security consists of the techniques and modes...
0FansLike