Information warfare: Agents, attack and defence.
The internet-enabled people to receive information in real-time. The interconnection of systems allowed algorithms to be remotely controlled and to make autonomous decisions. Information warfare (IW) is characterized by the search for destabilization, exploitation, corruption and destruction of information systems controlled by the adversary.
Continue readingSecurity Awareness poster
I love coffee, so I did a security awareness poster connecting the Coffee time and Security tips!
Continue readingClassifications of computer criminals
With the expansion and diversification of cybercrime, strategies have become an obstacle to understanding and categorizing crime agents.
Continue readingControlling cybersecurity issues
Professionals and managers seek daily to identify these elements and take preventive or corrective actions to avoid damage caused by these events.
Continue readingMultiple XSS on API Manager 3.1.0
Cross-Site Scripting (XSS) vulnerability on WSO2 API Manager Product. By exploiting a Cross-site scripting vulnerability the attacker can hijack a logged-in user’s session by stealing cookies which means that a malicious hacker can change the logged-in user’s password and invalidate the session of the victim whilethe hacker maintains access. DETAILS:
Continue readingReflections about cybercrime
With the growth of the number of people connected to the internet, cybercrime has become a severe problem globally.
Continue reading