Archive for Author: admin@delta

THINK BEFORE YOU CLICK

Cybercrime has risen over the years and continues to rise globally. It has become an enormous challenge in all areas including national security, public safety and personal privacy. From simple Facebook hacking to more largescale fraudulent activities cybercrimes have taken hit at everyone, at least once.

Read More

TYPES OF CYBER ATTACKS

A Cyber-Attack is any kind of action that targets a Computer Information System and damages or steals the victims data. The data acquired is modified, damaged, sold or even held at ransom from the victim. The hacker does this through various types of Cyber-Attacks.

Read More

PORT SCANNING

Organizations use different channels to reach their customers. The company website being the primary means of reaching your existing customers and potential customers these days. From startups to multinationals, every organization has their own website.

Read More

VULNERABILITY ASSESSMENT

Organizations use different channels to reach their customers. The company website being the primary means of reaching your existing customers and potential customers these days. From startups to multinationals, every organization has their own website.

Read More

WHAT IS SQL INJECTION

SQL Injection (SQLi) is one of the most dangerous web-based vulnerabilities. OWASP, a non-profit organization, dedicated to improving security of web applications, conducts a research and lists down the top 10 vulnerabilities each year.

Read More

Benefits of Honeypots

In my previous blog I discussed Port Scanning. In this blog I would like to discuss another method used to protect servers from attackers using Network Honeypots. A Honeypot is a sweet looking server, at least it’s intended to look sweet to the attacker, similar to how bears view honey. Honeypot is an additional security protection that can be used alongside a firewall this will help to protect your network from hackers.

Read More