One of the major risks faced by the majority of private and public companies is, of course, data theft. In practice, the DNS proves to be an asset for cyber criminals to carry out their plan. Because we usually find that it is almost never inspected during security checks. This article will also interest you: … Continue reading When the DNS becomes a "Backdoor"
In early October, the Mozilla Firefox browser announced the rollout of its DNS-over-HTTPS (DoH) technology, which had been in development for 2 years now. However, from the outset, this program will be a great controversy in the web community. it must be admitted that many people did not adhere logically. This article will also interest … Continue reading Would Firefox's DNS-over-HTTPS (DoH) be bad?
If today's cyberattacks have become fairly common things from hearing about them, we should still raise the fact that they are not as well known as we think. Indeed, there are some that in a rather exceptional way have marked the history of cybercrime. 1- NotPetya It's a computer attack that occurred a month after … Continue reading 5 computer attacks that have marked the history of cybercrime
For some time now, private virtual networks or VPNs (Virtual Private Networks) have become increasingly popular. Same main feature that is to facilitate the security of internet connections with other benefits has made it quite popular. Especially on smartphones, on which the bulk of internet traffic is received today. This phenomenon causes hackers to attack … Continue reading The usefulness of VPN on smartphones
It is clear that in the field of computer security, the female sex is largely under-represented. In 2017, a study in the United States found that women hold only 14% of professional positions in the computer security sector. Globally, this figure was 48% of the overall workforce. In 2018 this figure fell below 10% in … Continue reading What if the problem with cybersecurity was his lack of a wife?