Category: Application, Data, & Host Security

Educate yourself on how to harden your own systems

The 5 Factors of Authentication

Many people confuse authentication with authorization. They both start with "auth," so I can see how these terms might be mistakenly used interchangeably. The reality is authentication comes before authorization. Authentication is simply proving you are who you say are. For example, you provide your identity, such as a username or E-mail, and then you ...

Understanding the CIA Triad

No, I'm not referring to the Central Intelligence Agency, I'm referring to the three security principles: Confidentiality, Integrity, and Availability. In the cybersecurity world, these 3 principles are our core security goals. Confidentiality We keep sensitive and personal information "confidential," that is, the confidentiality principle enshrouds itself in preventing the unauthorized disclosure of data. We ...

The Different Classes of Malware

Malware is the term we've assigned to describe all the different classes of malicious code out in the wild. As you'll see, there are several different classes of malware. One popular type of malware that most people are aware of is a virus. As you'll come to find, there are actually many different sub-classes of ...

PenTest Edition: Creating A Man-in-the-Middle Attack using Cain & Abel [Tutorial]

A man-in-the-middle attack occurs when an attacker sits in the middle of the communication between two victim devices, secretly relaying information back-and-forth on their behalf. It can be thought of as active eavesdropping. The attacker cannot only see the communication traveling to-and-from the victim devices, but can also inject his own malicious traffic. With this ...

Android Malware is Still a BIG Issue

Malware, Malware, and More Malware: If you're staying up-to-date with the latest cybersecurity news, then you'd know that Google's Android OS is receiving a lot of unwanted attention. Just recently, it was discovered that Android devices are the most susceptible to the recent Wi-Fi KRACK attacks. You can read more about that in my earlier ...