Owned

The term “owned” is used to describe a system that has been compromised by an attacker. This can mean that the attacker has complete control over the system, or simply that they have access to sensitive data or functionality that they should not have access to. Owned systems are often used as a foothold by … Read more

Adaptive security

Adaptive security is a type of security that is constantly changing and evolving in order to better protect against new threats. It is a proactive approach to security that uses a variety of techniques to stay one step ahead of attackers. Adaptive security begins with a strong foundation of security best practices. This includes things … Read more

Learning Guide: Spyware

A learning guide on spyware is a document that provides instructions on how to identify, remove, and protect against spyware. Spyware is a type of malicious software that is installed on a computer without the user’s knowledge or permission. Spyware can collect personal information, track web browsing activity, and display advertising. It can also slow … Read more

Human attack surface

A human attack surface is the portion of a system that is vulnerable to attack by a human adversary. This can include both physical and logical components, such as entry points, administrator interfaces, and user accounts. The goal of a human attack surface analysis is to identify and quantify the risks posed by human adversaries, … Read more

Vulnerability management planning

Vulnerability management planning is a process of identifying, classifying, and prioritizing vulnerabilities in computer systems, networks, and software applications. The goal of vulnerability management planning is to reduce the risk of exploitation of vulnerabilities by creating and maintaining a schedule of security updates and patches. The first step in vulnerability management planning is to identify … Read more

Password strength meter

A password strength meter is a tool that measures the strength of a password. The strength of a password is determined by its length, complexity, and uniqueness. The longer the password, the more complex it can be, and the more unique it is, the stronger it is. A password strength meter can be a useful … Read more

Active reconnaissance

Active reconnaissance is a type of security testing that involves actively interacting with a system in order to gather information about it. This can be done in a number of ways, such as trying to login to a system with various username and password combinations, or running a port scan to see which ports are … Read more

Virus signature (virus definition)

A virus signature is a unique identifier that is used to identify a specific virus or group of viruses. Virus signatures are often used by antivirus software to detect and remove viruses from a computer. Why is virus signature used? Virus signatures are used to detect and remove viruses from a computer or network. They … Read more

Sender ID

The term “Sender ID” refers to the identification of the sender of a message. This can be done in a number of ways, but is typically done by looking at the message headers. The sender’s ID can be used to track down the source of spam or other malicious messages, and can also be used … Read more

SS7 attack

An SS7 attack is a type of network attack that exploits a flaw in the Signaling System 7 (SS7) protocol to gain access to the victim’s text messages, calls, and location data. The attacker does not need to be on the same network as the victim; all that is required is access to an SS7 … Read more