"cyber attacks" tag
The art of crafting

Cyber Attacks Explained: Packet Crafting

Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure vulnerability exploitation scenarios. This article takes a step forward…

Web Exploitation

Cyber Attacks Explained: Web Exploitation

Websites are no longer merely about having an “Internet presence” today, but are also used for commercial transactions and to transfer sensitive data. Such wide usage helps crackers gain more knowledge on vulnerabilities…

Yet another kind of cyber attack, eh?

Cyber Attacks Explained: DNS Invasions

We often read about defaced websites whose pages get changed to some malicious content. How do hackers do it and how do we protect our infrastructure from them? This article is about how…

Marching packets

Cyber Attacks Explained: Packet Spoofing

Last month, we started this series to cover the important cyber attacks that impact critical IT infrastructure in organisations. The first was the denial-of-service attack, which we discussed in detail. This month, we…

Oops, am under attack, again!

Cyber Attacks Explained: DoS and DDoS

With this article, we begin a new series on the major kinds of cyber attacks that weaken the IT security infrastructure within organisations. With the rapid spread of Internet technologies and applications, the…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.