Category: Application, Data, & Host Security

Educate yourself on how to harden your own systems

Understanding the CIA Triad

No, I'm not referring to the Central Intelligence Agency, I'm referring to the three security principles: Confidentiality, Integrity, and Availability. In the cybersecurity world, these 3 principles are our core security goals. Confidentiality We keep sensitive and personal information "confidential," that is, the confidentiality principle enshrouds itself in preventing the unauthorized disclosure of data. We ...

PenTest Edition: Creating A Man-in-the-Middle Attack using Cain & Abel [Tutorial]

A man-in-the-middle attack occurs when an attacker sits in the middle of the communication between two victim devices, secretly relaying information back-and-forth on their behalf. It can be thought of as active eavesdropping. The attacker cannot only see the communication traveling to-and-from the victim devices, but can also inject his own malicious traffic. With this ...

Android Malware is Still a BIG Issue

Malware, Malware, and More Malware: If you're staying up-to-date with the latest cybersecurity news, then you'd know that Google's Android OS is receiving a lot of unwanted attention. Just recently, it was discovered that Android devices are the most susceptible to the recent Wi-Fi KRACK attacks. You can read more about that in my earlier ...