Hacking Methodologies

A hacking methodology refers to the step-by-step approach used by an aggressor to attack a target such as a computer network. There is no specific step-by-step approach used by all hackers. As can be expected when a group operates outside the rules as hackers do, rules do not apply the same way. A major difference … Read more

As an ethical hacker you must agree to the some code of ethics

Keep private and confidential information gained in your professional work (in particular as it pertains to client lists and client personal information). Do not collect, give, sell, or transfer any personal information (such as name, e-mail address, social security number, or other unique identifier) to a third party without prior client consent. Protect the intellectual … Read more

Ethical Hacking and Penetration Testing

Ethical hackers engage in sanctioned hacking—that is, hacking with permission from the system’s owner. In the world of ethical hacking, most tend to use the term pen tester, which is short for penetration tester. Pen testers do simply that: penetrate systems like a hacker, but for benign purposes. As an ethical hacker and future test … Read more

Bad Guys and Good Guys or Hackers and Ethical Hackers

how to prevent hacking in linux

The difference between an ethical hacker and a hacker is something that can easily get you into an argument. Just saying the word hacker in the wrong place can get you into an hours-long conversation of the history of hacking and how hackers are all good guys who mean nothing but the best for the … Read more

The Evolution and Growth of Hacking

Attackers have constantly sought to “up” their game with new tactics and strategies to include new types of malware such as worms, spam, spyware, adware, and even rootkits. Although they already knew how to harass and irritate the public, in recent years they have caused ever bolder disruptions of today’s world by preying on our … Read more

Current Developments in Hacking

In the early 2000s, more malicious activity started to appear in the form of more advanced attacks. In fact, in the first few years of the new millennium the aggressiveness of attacks increased, with many attacks criminally motivated. Malicious attacks that have occurred include the following, among many more: ■ Denial-of-service attacks ■ Manipulation of … Read more

The Early Days of Hacking

As the story goes, the earliest hackers were a group of people who were passionate and curious about new technology. They were the equivalent of those modern-day individuals who not only want the latest technology, such as a smartphone or iPhone, but also want to learn all the juicy details about what the device does … Read more

Russian Hackers Named ‘Cozy Bear’ Are Targeting COVID-19 Vaccines

A security organization in the U.K. says a group of Russian hackers is targeting research centers involved in COVID-19 (coronavirus) vaccine development. The adversary group is using spear-phishing to target the research centers, a practice that uses deception to get victims to click on links with hidden malware. These attacks come at a time when U.S.- and U.K.-based … Read more

How Hackers Can Pick Your Locks Just By Listening

When someone is watching over your shoulder, it’s second nature to cover up your keyboard before typing in a password on your computer, or even unlocking your phone if you still use a pin passcode. But there’s another place where you should be cautious: the front door. Hackers could be recording the sounds that your keys make … Read more