Teardrop attack – Definition and Details

Teardrop attack explained

The Teardrop attack is one of the popular DoS (Denial-of-Service) attacks. It aims to overwhelm its target with malicious fragmented data packets, which the victim is not able to reconstruct and finally is incapable of operating. This attack takes advantage of a specific vulnerability inside the TCP/IP reassembly operation. The fragmented data packets exceed the capacity of the victim until, at some point, it crashes in its try to process them. 

How to detect the Teardrop attack?

Continue reading “Teardrop attack – Definition and Details”

4 common phishing attacks and how to protect yourself?

The phishing attacks are another deceptive experience criminals have in store for us. Not a surprise, since the Internet and its amazing development have also attracted people from the dark-criminal side.

How to get profits is a question with legal but also illegal answers. And phishing belongs to the second group. It is a fraudulent way to take advantage of people and/or organizations, to get their money. 

Phishing attack – How does it work?

Continue reading “4 common phishing attacks and how to protect yourself?”

DoS vs DDoS attack (differences)

Such a title is the introduction to a really heavy menu. Both are perhaps, the most dangerous attacks that can be implemented online. Consequences for targets are absolutely not pleasant. Servers’ outages lead to big losses in terms of time, money, users’ and partners’ trust.

Criminals’ purposes define the strength of the attack.

  • To demand a ransom.
  • To call attention or defending personal or political ideas. 
  • To show power. Some hackers look for respect in their community through such attacks.
  • To delete a rival competitor through these unfair methods.
  • To distract companies’ owners from data breaching. 

Continue reading “DoS vs DDoS attack (differences)”

5 hackers who made history

Originally, hacking had a positive connotation. Hackers were tech enthusiasts trying their creativity for optimizing, customizing, and tweaking. 

This changed dramatically when such “creativity” was used to breach security defenses from systems and networks to exploit them through stealing, altering, or destroying information. 

Currently, just to mention, the word “hacking” can get us goose gumps. We know how harmful it can be and that everybody can fall, governments, big and small companies, famous and common people.

Let’s check 5 modern hackers who made history!

Continue reading “5 hackers who made history”