Swathi RajagopalClickjacking | The hidden threat right in front of you.Clickjacking is an attack tactic used by cybercriminals. It is similar to the Cross-site scripting (XSS) method.Jul 2, 2020Jul 2, 2020
Swathi RajagopalWhat is a keylogger? How attackers can monitor everything you typeKeylogger — A Hacker’s ToolJun 25, 2020Jun 25, 2020
Swathi RajagopalSoftware Patches and Why is it important?Occasionally, your computer displays a pop-up message which by default is being ignored by the majority. The pop-up message reminds you of…Jun 8, 2020Jun 8, 2020
Swathi RajagopalWhat is a DNS hijacking/redirection attackEvery device, node on the Internet has a unique name and IP address assigned to it. DNS translates these unique IP addresses to…Jun 4, 2020Jun 4, 2020
Swathi RajagopalCyber Security MonitoringCybersecurity monitoring plays a critical part. It involves data gathering from a wide range of security systems and to analyze it with…May 29, 2020May 29, 2020
Swathi RajagopalWhat is a Firewall and Why Do I Need One?Firewall Network SecurityMay 22, 2020May 22, 2020
Swathi RajagopalWhat is Vulnerability Assessment & Penetration Testing (VAPT)What is VAPT?May 21, 2020May 21, 2020