Exploit Attempts

A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular vulnerability the system offers to intruders. Failure to install a patch for a vulnerability exposes the user to a computer exploit and the possibility of a security breach.

Social Engineering

Social engineering is the art of manipulating people so they give up confidential information. Criminals usually try to trick you into giving them your passwords or bank information that will give them access to your passwords and bank information as well as giving them control over your computer.

phishing

Phishing is the fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in an electronic communication.It is popular in cybercrimes, as it is easier to trick someone into clicking a malicious link in a seemingly legitimate phishing email .

OSINT TOOLS

Open-source intelligence tools (OSINT) is data collected from publicly available sources to be used in an intelligence context. In the intelligence community, the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources). Examples- Virustotal, Ipvoid etc.

Information Security

InfoSec is the practice of preventing unauthorized access, disclosure, disruption, modification, inspection, recording or destruction of data. To get better understanding of this domain, we should be aware of infosec terminologies like CIA triad etc.

Malware

Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. Malware does the damage after it is implanted or introduced in some way into a target's computer and can take the form of executable code, scripts and other software.

Security@Speaks

Subscribe Us for Latest posts and updates



Play Video