Skip to main content

Posts

Showing posts from July, 2018

Information Security Overview in securetecho

Information Security Overview in securetecho Malware Trends  in 2018 Source code leaks  accelerated malware release cycles                                                  Attackers create new variants of malware variants   Contains new characteristics, signatures, evasive capabilities, etc.                       Anti-virus/anti-malware cannot d etect Old school malware techniques  made a comeback                                                      Anti-virus applications、IDS、firewall and cyber-crime techniques                    Forcing an attacker to use artificial and time consuming ol...

Ethical Hacking Concepts and Scope in securetecho

1.4 Ethical Hacking Concepts and Scope in Securetecho What is  Ethical Hacking ? Ethical hacking involves the use of hacking tools, tricks, and techniques to  identify vulnerabilities  so as to ensure system security. It focuses on simulating techniques used by attackers to  verify the existence of exploitable vulnerabilities  in the system security. Ethical hackers performs security assessment of their organization  with the permission of concerned authorities . Why  Ethical Hacking  is Necessary To beat a hacker, you need to think like one! Ethical hacking is necessary as it  allows to counter attacks from malicious hackers  by anticipating methods used by them to break into a system. Reasons why Organizations Recruit Ethical Hackers : To  prevent hackers  from gaining access to organization's information. To  uncover vulnerabilities  in systems and explore their potential as a risk. To an...