Blog Credit: Trupti Thakur Image Courtesy: Google RomCom Microsoft Threat Intelligence has identified threat actors abusing a recently disclosed vulnerability, CVE-2023-36884, in phishing campaigns containing malicious Word documents against government entities in Europe and North America. CVE-2023-36884 was disclosed along with three other vulnerabilities by Google TAG, no patch was released for the vulnerability and […]
Blog Credit: Trupti Thakur Image Courtesy: Google CDMA Vs GSM Difference between CDMA and GSM Cellular mobile services have been used all over the world for a long time and still evolving day by day. With these services, various communication services also evolved, and CDMA and GSM are two of them. CDMA and GSM are the two […]
Blog Credit: Trupti Thakur Image Courtesy: Google Introduction to Switching Modes Data transmission and error checking on transmitted and received frames are handled by Layer 2 switches on the data connection layer. The MAC address determines how Layer 2 switches forward packets. The different packet-forwarding modes are referred to as switching modes. Switching mode distinguishes between […]
Blog Credit: Trupti Thakur Image Courtesy: Google Switching When a user accesses the internet or another computer network outside their immediate location, messages are sent through the network of transmission media. This technique of transferring the information from one computer network to another network is known as switching. Switching in a computer network is achieved by […]
Blog Credit: Trupti Thakur Image Courtesy: Google Challenge Response Authentication Mechanism (CRAM) In computer security, challenge-response authentication is a set of protocols used to protect digital assets and services from unauthorized users, programs or activities. While challenge-response authentication can be as simple as a password, it can also be as dynamic as a randomly generated request. […]
Blog Credit: Trupti Thakur Image Courtesy: Google Server Name Indication What is Server Name Indication (SNI)? This article will provide a detailed explanation of the topic called Server Name Indication (SNI). Before moving on to the main topic, let us understand the server name. What is Server Name? A server name is just a computer’s […]
Blog Credit: Trupti Thakur Image Courtesy: Google Operation of Blue & Red Teaming Security is a multifaceted field with multiple roles for carrying out diverse operations. In this article, we demystify the concept of the red and blue teams in security. First, why do we need to bifurcate security roles for two teams on Penetration […]
Blog Credit: Trupti Thakur Image Courtesy: Google Autonomous System What is Autonomous System? An autonomous system (AS) consists of several connected Internet Protocol routing prefixes. One or more network operators manage all these routing prefixes in place of a single administrative entity or organization. These IP prefixes have a clearly defined routing policy that states […]
Blog Credit: Trupti Thakur Image Courtesy: Google Onion Routing Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to layers of an onion. There is a large set of precautionary measures and best practices to make web browsing safer […]
Blog Credit: Trupti Thakur Image Courtesy: Google Software Defined Networking (SDN) Introduction Software-defined networking (SDN) is a new networking paradigm that separates the network’s control and data planes. The traditional networking architecture has a tightly coupled relationship between the data and control planes. This means that network devices, such as routers and switches, are responsible for […]
The Delhi police using Automated Facial Recognition Technology to screen crowds Indian legislation enforcement is beginning to significantly impact facial recognition expertise. Facial recognition Technology is an automated process of comparing two images of faces to determine whether they represent the same individual. The Delhi Police trial of a facial recognition system commissioned by the […]
Blog Credit: Trupti Thakur Image Courtesy: Google Blue Smack Attack in Wireless Networks Blue smacking is one of the older types of attacks against the protocol. In our investigation of this attack, you’ll find that it’s a variant of a common attack called denial of service against networks, devices, and applications. In short, when we […]