Home / IT Security / Black Hat

Black Hat

Types of Attackers

Types of Attackers

Controlling access is not limited to the control of authorized users; it also includes preventing unauthorized access. Information systems may be attacked by a variety of attackers, ranging from script kiddies to worms to militarized attacks. Attackers may use a variety of methods in their attempts to compromise the confidentiality, …

Read More »

Understanding Denial of Service

Understanding Denial of Service

Understanding DoS: Denial of Service is an attack that aims at preventing normal communication with a resource by disabling the resource itself or by disabling an infrastructure device providing connectivity to it. The disabled resource could be in the form of customer data, website resource, or a specific service, or …

Read More »

Commonly Employed Threats

Commonly Employed Threats

Commonly Employed Threats: Many threats will continue to pose problems for those using the Internet, and unless you opt to stop using this resource, you must address the threats. This section explores threats targeted toward human beings and the weaknesses of human nature. What type of threats target users and …

Read More »

Social Networking To Gather Information?

Social Networking To Gather Information?

Social Networking to Gather Information: Over the last decade, some of the biggest security threats have come from the use of social networking. The rapid growth of these technologies lets millions of users each day post on Facebook, Twitter, and many other networks. What Type of Information Are They Posting? …

Read More »

Social Engineering : Identity Theft

Identity Theft

Identity Theft: One of the most prominent and rapidly evolving threats is identity theft, which falls under the heading of social engineering. According to the Federal Trade Commission, in the United States, identity theft is one of the most rapidly growing crimes over the last few years; thus, the public …

Read More »

The US Police Phone Tracking Company Hacked

The US Police Phone Tracking Company Hacked

US Police Phone Tracking: The Securus is a basically a phone tracking company that helps the police to track any phone which is within the U.S. Recently, The company was under a major attack when a hacker successfully hacked into the their system. According to Motherboard the hacker may have …

Read More »

Screensavers and Locked Screens

Screensavers and Locked Screens

Screensavers and Locked Screens: In the past, one of the common ways to gain access to a system to simply look around for an unattended system. In many cases, the system would be left logged in and unlocked by a user who was going to step away “for a moment” …

Read More »

Scripting Errors

Scripting Errors

Scripting Errors: Web applications, programs, and code such as Common Gateway Interface (CGI), ASP.NET and JavaServer Pages (JSP) are commonly in use in web applications and present their own issues. Vulnerabilities such as a lack of input validation scripts can be a liability. A savvy hacker can use a number …

Read More »