big data

Protecting Big Data with Hadoop: A Cyber Security Protection Guide

Big Data analytics is emerging from today's technology as people are demanding better ways to protect their Big data. Keep reading to find out how Hadoop via cybersecurity methods in this post. What is Hadoop? Hadoop is a Java-based, open...
CIA Triad

Most Important Consideration of Confidentiality, Integrity, Availability (CIA Triad) to Avoid Organisational Data Breach

It is not wrong to say that information is power in today’s fast-changing competitive world. The one who has the right information at the right time and can use it in the right way is at the top of...
Is it a legitimate website

Is it a Legitimate Website : How to Check if a Website is Safe

Malicious websites available everywhere over the Internet, it is very difficult to find a trustworthy website. We need to browse smart and need to make sure the site is not dangerous by using Multiple approaches. In general, it is good to type...
IMSI Catcher

An In-Depth Look of IMSI Catcher – A Device for Law Enforcement Agencies...

There are countless YouTube videos and blogs that talk about IMSI catcher, which are popularly known as Stingrays in the United States. These devices allow law enforcement agencies the capabilities to track cell phones, gather information on that phone,...
Black-box Penetration Testing

How To Perform External Black-box Penetration Testing in Organization with “ZERO” Information

The objective was simple – see how susceptible the organization is from an external point of view and test the effectiveness of the security controls that are managed enterprise-wide. As such, asides, the company name, we were given “ZERO”...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended