If you’re connected to a network then you can use technologies such as SSH to secure your data. Okay. We already knew that you might…
Tag: network security
Betabot Trojan Phase II: Stealing credentials and transmitting ransomwares
If there is one thing that hackers and cyber criminals are good at, it’s coming up with new evil Betabot trojans. But can you really…
Rationalizing VM Security: Exploiting DRAMs
When it comes to securing Virtual Machines (VM Security), physical vulnerabilities in memory chips is the Achilles heel amongst all the potential weaknesses currently existing…
Evil Twin Router
What is an Evil Twin Router? Evil twin Router is a rogue Wi-Fi access point that appears to be a legitimate one, but actually as…
SDN: Everything You Need to Know
What is software defined networking? If you are wondering what SDN is about, then you are not alone. Aside from network engineers, most people don’t…
How to Create a Network Security Policy?
Introduction Network security policy is a document describing company’s strategy towards maintaining confidentiality, integrity and availability (CIA) of network assets. It is one of the…