Monthly Archive: June 2011

Evil Twins: The Dark Side of Using Wifi Hotspots

If you think Evil Twins sound like something out of a B Sci Fi movie, think again. They’re more likely to be lurking near your laptop at a public WiFi hotspot. Find out how to avoid becoming a victim.

Firesheep

Firesheep is a software program that uses a packet sniffer to intercept unencrypted cookies from certain websites (such as Facebook...

DNS Spoofing

Assuming the DNS (Domain Name System) name of another system by either corrupting the name service cache of a victim...

Promiscuous Mode

A mode of operation where a device is configured to receive all data on a network regardless of its destination...

Spam

Irrelevant or inappropriate messages sent via email to a large number of recipients.  

Network

Two or more computers which are connected.

WAN

Wide Area Network. A network that provides capabilities for a number of independent devices to communicate with each other over...

Smartphone

An electronic handheld device that functions as a mobile telephone, but also provides additional information accessing features, such as email...

TCP/IP

TCP/IP is the communication protocol for the Internet, and defines the rule computers must follow to communicate with each other...

LAN

A local area network, which is a local computer network for communication between computers, especially computers and word processors and...

Mass Meshing

Also known as mass SQL injection, this is a method whereby hackers poison websites by illegally imbedding a redirection javascript...

IDN Spoofing

IDN (Internationalized Domain Name) Spoofing, also known as IDN homograph attack, is a way in which a malicious party may...