What Is ARP Spoofing attack and How does it work

ARP spoofing

ARP spoofing (Address resolution protocol) is a technique that causes the redirection of network traffic to a hacker. The basic principle behind ARP spoofing is to exploit the lack of authentication in the ARP, it is a type of attack in which attacker sends fake Address Resolution Protocol (ARP) messages inside a Local Area Network (LAN). … Read moreWhat Is ARP Spoofing attack and How does it work

What is MAC Address and how to find It

MAC Address

MAC Address Stands for “Media Access Control Address is a unique identifier for an Ethernet or network adapter over a network. it’s also sometimes referred to as hardware or physical address and burned-in address. MAC Address is manufactured into every network card, such as an Ethernet card or Wi-Fi card, and therefore cannot be changed. It … Read moreWhat is MAC Address and how to find It

Data Breach and Some Common Data breach methods

Data Breach

A data breach is a security incident that involves the unauthorized or illegal, sensitive protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so without the knowledge or authorization of the system’s owner. Common  Data breaches may involve personal health information (PHI), personally identifiable information (PII), trade secrets … Read moreData Breach and Some Common Data breach methods

What is evil maid attack and How to Prevent It?

evil maid attack

Evil maid” attacks can be anything that is done to a machine via physical access while it is turned off, even though it’s encrypted. An evil maid attack is characterized by the attacker’s ability to physically access the target multiple times without the owner’s knowledge. evil maid’ attack represents a very specific threat with limited … Read moreWhat is evil maid attack and How to Prevent It?

What Is Tor | Browse the Web Anonymously

tor

Tor (The Onion Router) is an open-source software program that hides your activity and location online by routing all your browsing through multiple anonymous servers, thereby it prevents somebody watching your Internet connection from learning what sites you visit. It prevents the sites you visit from learning your physical location, and it lets you access sites … Read moreWhat Is Tor | Browse the Web Anonymously