different-types-keylogger

Types of keylogger or Keystroke Logger

0
There are two types of keyloggers, based on the process applied to install and control keylogger. Software-based keylogger and another one is hardware-based keylogger 1. Software-based keyloggers Software-based keyloggers are programs that...
bug-bounty geeksogle

Bug Bounty Program offers Up to $20,000 by Microsoft

0
Microsoft just launches a new Xbox Bug Bounty Program to reward bug researchers. So, anyone who finds vulnerabilities in the Xbox Live system and services. Bounty awards will extend from $500...
data-breach

Data Breach! How to protect yourself from the data breach

0
"Data Breach" - You may have heard this term many times. Because it uses many times to cover feature stories in major newspapers or TV channels. But many do not know...
malware 06 geeksoogle

What Is Malware?

0
Malware or malicious software is a kind of program or code which is intentionally develop to form damage or destroy a computer, server, or computer system. Like (by contrast, software that...
cyber-crime geeksogle

Different Types of Cyber Crime or Computer Crime

0
Computer crime Alternatively connected to Cyber crime. It also known as e-crime, electronic crime, or hi-tech crime. Computer crime an order performed by an expert computer user. On the other hand,...
vulnerability-scanning

What is Vulnerability Scanning?

0
Vulnerability scanning or vulnerability assessment is a systematic process of finding security loopholes in any system addressing the potential vulnerabilities. The purpose of vulnerability assessments is to prevent the possibility of unauthorized...
sql-injection

What is SQL Injection Attacks and How it works?

0
SQL Injection (SQLi) is a kind of injection attack that makes it reasonable to perform malicious SQL records. These records control a database server behind a web application. Attackers can use...
Steganography geeksoogle

What Is Steganography in Cyber Security?

0
Steganography, the method of hiding data, has been encompassing for centuries. And in parallel to technological advances, steganography has also evolved and changed with the advent of computers and the internet.Digital...
Cyber-attack-geeksoogle

Different Types of Cyber Attack!

0
Cyber attack is the intentional exploitation of network systems and technology-dependent industries. These attacks apply a spiteful code to change computer code, data, or inference. Finishing into negative outcomes that can...
penetration

What is Penetration Testing or Pen Testing in Cyber Security?

0
What is penetration testing? Penetration testing (or pen testing) is a security practice where a cyber-security specialist tries to find and exploit vulnerabilities in a computer system. The purpose of this simulated...
0FansLike