Recent Posts

What are Web Cookies: Privacy, Security & Compliances

What are web cookies

Cookies, also known as “Web Cookies” or “HTTP Cookies”, are widely used across the Internet since their inception in 1994. They were invented by a 23-year-old computer programmer Lou Montulli in 1994 when he was working with Netscape. In this post, we will take a deep dive into the functioning …

Read More »

Types of Encryption: Defined, Explained & Explored

types of encryption symmetric asymmetric AES DES

Cybercrimes are on the rise, and it’s comforting to know that there are methods to protect network security from the prying eyes of Cybercriminals as there are ways of trying to penetrate it. In this post, we will delve deeper into what is encryption and the types of encryption. Cybersecurity …

Read More »

Bluetooth attacks: BlueJacking, BlueSnarfing & BlueBugging

Bluetooth attacks Bluesnarfing, Bluejacking, Bluebugging & Bluesmacking

With the rapidly growing adoption of Bluetooth by portable devices and IoT devices primarily because of the ease of use, the threats related to Bluetooths are growing manifold. Like any other technology, Bluetooth is vulnerable to several attacks, including BlueSmacking, BlueJacking, BlueSnarfing, and BlueBugging. In this post, we will be …

Read More »

What is SSL Stripping: Defined, Explained and Explored

what is https ssl stripping

An attacker can remove the encryption from a client-server communication by using SSL stripping, aka SSL Hijacking. In this post, we will discuss SSL stripping and some related topics in detail. While SSL is used to secure the communication between the client and the server across the Internet, SSL can …

Read More »

What is ARP Spoofing/Poisoning & tips for security

How ARP Spoofing works

ARP Spoofing consists of a hacking technique created to impersonate entities or people on the network to obtain private information or gain access to websites and applications with a stolen session-id or credentials or launch a DoS attack. To understand what ARP spoofing is and how it works, we need …

Read More »