search expand
Skip to content
Security Zap

Security Zap

Cyber Security Done Right – Find out more about cyber security, internet safety, cyber crime, deep web, cyber attack and network security.

  • Cybersecurity
    • Threat
    • Tools
    • News
  • Tech
  • Business
  • Education
  • Home Tech
cyber attack

Cyber Attack on Bundestag

Posted on May 16, 2015February 26, 2024 by Security Zap

According to Spiegel the national parliament of Germany, Bundestag, has been targeted by a major cyber attack allowing unknown perpetrators to penetrate internal network. According to…

Posted in Cyber Attacks, News, Security NewsTagged bundestag, cyber attack, data breach, germany1 Comment on Cyber Attack on Bundestag
network security policy

How to Create a Network Security Policy?

Posted on May 16, 2015February 26, 2024 by Security Zap

Introduction Network security policy is a document describing company’s strategy towards maintaining confidentiality, integrity and availability (CIA) of network assets. It is one of the…

Posted in CybersecurityTagged network security, risk assessment, security policyLeave a Comment on How to Create a Network Security Policy?
cyber space of iran

Cyberspace and Cyber Warfare Capabilities of Iran

Posted on May 14, 2015December 31, 2015 by Security Zap

Introduction Internet is probably the most valuable asset for billions of people all around the world. It plays key roles in our social life, governance,…

Posted in Cyber AttacksTagged cyber capabilities, cyber space of iran, cyber warfareLeave a Comment on Cyberspace and Cyber Warfare Capabilities of Iran
scada plc pls

Vulnerabilities in Industrial Control Systems – SCADA

Posted on May 14, 2015May 14, 2015 by Security Zap

Industrial Control Systems (ICS), operate the global industrial infrastructures, such as pipelines, nuclear stations, oil, electricity and much more. ICS comprises Supervisory Control and Data…

Posted in VulnerabilitiesTagged industrial control systems, plc, pls, scada, vulnerabilitiesLeave a Comment on Vulnerabilities in Industrial Control Systems – SCADA

Posts navigation

Previous 1 … 148 149

Search

Recent Posts

  • Deception Technology: How Fidelis Security Helps Enterprises Turn the Tables on Attackers
  • 4 Benefits of Using an AI Text Humanizer
  • Building a Stronger Data Loss Prevention Strategy Through Risk Assessment
  • Beyond Break-Fix: How Modern Outsourced IT Support Drives Business Growth
  • Advantages and Drawbacks of Single Page Applications (SPAs)
security zap logo

All Rights Reserved. © Copyrights 2020 SecurityZap.com

Pages

  • About Us
  • Privacy Policy and Terms of Service
  • Sitemap
  • Sitemap
  • Privacy Policy and Terms of Service
  • About Us