Cyber Security

CyberWarfare

Cyber warfare refers to the use of technology to launch attacks on nations, governments, and citizens, causing comparable harm to actual warfare using weaponry. To date, there hasn’t been an outright “cyberwar” with declared antagonists, however, there are a number of incidents that have caused serious disruption to countries’ infrastructure that are suspected of being […]

CyberWarfare Read More »

salami slicing attack

A salami attack is when you take a very small amount of money from an awful lot of accounts. The canonical example is a bank programmer depositing sub-cent amounts of interest in a special account. These rounding errors add up.I’m trying to find the first actual documented theft or attempted theft using this attack.I’m hoping

salami slicing attack Read More »

Malware Bot

A bot (short for “robot”) is a program that operates as an agent for a user or another program or simulates a human activity. On the Internet, the most ubiquitous bots are the programs, also called spiders or crawlers, that access Web sites and gather their content for search engine indexes. Bots are also used

Malware Bot Read More »

Malware zombie

A zombie is a computer that has been implanted with a daemon that puts it under the control of a malicious hacker without the knowledge of the computer owner. Zombies are used by malicious hackers to launch DoS attacks. The hacker sends commands to the zombie through an open port. On command, the zombie computer

Malware zombie Read More »

GLUE RECORDS

In normal DNS resolution, when a resolver attempts to resolve a domain name, it first queries the root, which provides the top-level domain. Next, it queries the top-level domain servers, which provide the domain’s authoritative nameservers. Finally, it queries the authoritative nameservers for the domain to resolve the domain name. If the nameservers for a

GLUE RECORDS Read More »