Category: Cyber Security

Cyber Security September 13, 2019

Introduction to Spyware, Adware, and Scareware

In the previous article, I discussed malware, including its types: viruses, worms, ransomware, trojan horses, logic bombs, back doors, and rootkits. This article should discuss malware types, spyware, adware, and scareware. Spyware A computer installs this software without the end-user knowledge, enabling a criminal to get information about the user’s computer activities. The spyware activities...
Asad Ijaz Read More
Cyber Security September 13, 2019

What is Malware and Malicious Software?

Malware, or malicious software, is a program or file designed to disturb computer processes and operations or gain entrée to the computer system without the user’s knowledge or permission. Malware has become a common term for all hostile or intrusive software, computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. The...
Asad Ijaz Read More
Cyber Security September 12, 2019

Common Threats to End Users and Internet Services

Innovators and visionaries are two types of cybersecurity experts. These experts build different cyber domains of the Internet. They have the capability to find the power of data and bind it. They provide cybersecurity services and build special organizations for these services. These organizations provide protection services to people from cyber attacks. These professionals must...
Asad Ijaz Read More
Cyber Security September 12, 2019

Thwarting Cybercriminals – Exclusive Explanation

Thwarting cybercriminals is not an easy task. However, companies, governments, and organizations have started to take parallel action to limit and discourage cybercriminals. The following are actions thwarting cybercriminals. The following are the measures for thwarting cybercriminals and a brief explanation of each. Vulnerability Database The National Common Vulnerabilities and Exposure (CVE) was developed as...
Asad Ijaz Read More
Cyber Security September 12, 2019

Who Are Cybercriminals?

The typical cybercriminals in the cyber world in the early days were youngsters or hobbyists. Their attacks were generally limited to pranks and vandalism. But now, cybercriminals have become very dangerous. The attackers are individuals or groups. They try to make use of the vulnerabilities for their mission. These criminals are interested in credit cards,...
Asad Ijaz Read More
Cyber Security September 12, 2019

Types of Vulnerabilities to Network- Exclusive Explanation

Weaknesses of the network which is intrinsic in every network and its device which included routers, switches, servers, desktops and even security devices e.g. firewall etc. Usually, the endpoints, such as servers and desktop computers, are under attack. Defending the privacy of information, securing from unauthorized access and shielding the network against attacks is the...
Asad Ijaz Read More
Cyber Security September 12, 2019

Cyber Security Threats and Defense

Security Threats to network are an emergent problem for the individual as well as organizations in the whole world, and the security threats become worse and multiply day by day. Computer networks are necessary for everyday activities and both Individuals and organizations depend on their computers and networks. Intrusion to these computers by an illegal...
Asad Ijaz Read More
CCNA August 18, 2019

What is VLAN Attacks – Brief Explanation

In the previous article, I explained how trunks work. By default, trunk ports can use all VLANs and pass traffic for multiple VLANs across the same physical link between switches. The VLAN simplifies network administration and maintenance. It also improves the performance of the network, but it has some backhaul for hackers which is necessary...
Asad Ijaz Read More
Forum