Category: Threats & Vulnerabilities

Learn about the different types of threats facing our networks and systems

DoS and DDoS Attacks: How They’re Executed, Detected, and Prevented

A DoS and a DDoS...What's the difference? A "Denial of Service," or "DoS" attack, is a category of advanced cyberattack in which a single malicious user denies legitimate users access to a service by blocking or exhausting the resources of a victim system. The DoS is commonly carried out through some form of flooding mechanism, ...

Covert Channels: How Insiders Abuse TCP/IP to Create Covert Channels

The TCP/IP protocol suite, our conceptual model we use to explain the way in which data travels across a network, contains a myriad of communication protocols. The TCP/IP protocol suite generically refers to two main protocols: TCP and UDP, but there are many other protocols, some of which can be abused to create covert channels. ...

Reports Claim Cellebrite Can Unlock Any iPhone: Now the Federal Gov. Can Too

Remember when the FBI and Apple were in a tug-of war to unlock the iPhone of the San Bernardino mass shooter? Not only did Apple refuse to cooperate, but the company also publicly stated that they would no longer help law enforcement unlock any of their devices, putting its customer's privacy first. At some point ...

Tips for Securing Your Network

Before I begin, let's address two obvious questions. Number one, what kind of network are we talking about here? I'm referring to a large or enterprise network. However, you can implement some of these security solutions on your home or SOHO network. Well, maybe you wouldn't want a network access enterprise server at your home. ...