Blog

Blog

The Largest Security Breach in History!

The Largest Security Breach in History!

In 2013 there was a breach in yahoo’s cybersecurity that would become the largest cybersecurity breach in history. The attack was to steal information from yahoo’s users such as backup ...
Read More
A Thorough Examination and Explanation of XSS Attacks!

A Thorough Examination and Explanation of XSS Attacks!

For this blog post I will be discussing XSS attacks what this type of attack is, how attackers execute this attack, a real-world example of people exploiting this vulnerability, and ...
Read More
In Depth Look at SQL Injections!

In Depth Look at SQL Injections!

For this blog post I will be discussing SQL injections what this type of attack is, how attackers execute this attack, a real-world example of people exploiting this vulnerability, and ...
Read More
Looking Under the Hood at CSRF Attacks!

Looking Under the Hood at CSRF Attacks!

For this blog post I will be discussing CSRF attacks what this type of attack is, how attackers execute this attack, and real-world examples of people exploiting this vulnerability, and ...
Read More
The Different Types of Firewalls and How They Work!

The Different Types of Firewalls and How They Work!

Firewalls have been around since the internet has become popularized with the first network firewall being designed in the 1980s. Firewalls are the first line of defense a computer had, ...
Read More
How DDoS Attacks Really Work!

How DDoS Attacks Really Work!

A distributed denial of service (DDoS) attack is when there is a flood of traffic to a particular service or network making it impossible for actual users is operate with ...
Read More
History of Blockchain and How it Works!

History of Blockchain and How it Works!

Blockchain technology was originally created back in 2008 when a person or a group of people under the alias Satoshi Nakamoto invented the technology. Blockchain was originally created to serve ...
Read More
What is Wireless Security?

What is Wireless Security?

Wireless security is used for stopping any unauthorized access to systems or stealing information from a system and helps prevent damage to a system from using wireless networks. Today nearly ...
Read More
What are VPNs?

What are VPNs?

A virtual private network is a service that adds another layer of security to you when you are browsing the internet, by directing your connection through a server and subsequently ...
Read More
WordPress Websites vs Standard HTML Sites

WordPress Websites vs Standard HTML Sites

If you are looking to create a website and you are wondering why there are WordPress sites, as well as HTML sites here are the differences between the two and ...
Read More