Author: Ryan

LOW-tech Hacking

We are often lead to believe that hacking requires vast understanding in technology. This can be misleading. Some hacks are very low-tech, in a sense. In information security, social
Read More

Intro into DDoS

Our systems are faced with many types of attacks — some are designed to spy and steal information — while others are used for disrupting services. In information technology,
Read More

RANSOMWARE

Information is power, which gives it value. And losing access [to information] can have disastrous outcomes. This is why ransomware is such a thriving threat to our digital infrastructure.
Read More

SPYWARE

Spying is a very old technique. It is mostly used for obtaining information, covertly. Today, there are many forms of spying and some are even being viewed as
Read More

TROJANS

Malware come in many forms. From viruses to worms and even Trojans, systems are being constantly bombarded by these malicious software. Having a basic understanding is one step towards defending against
Read More

Viruses

Viruses are notorious. They create havoc and deal damages that are sometimes irreversible. Although, not all attacks on our systems are the work of viruses. Malware, often defined as
Read More

Latency

Bandwidth is not the entire picture when it comes to performance. As stated in the last lesson, it mostly defines the maximum capacity of a connection. Latency also
Read More