


Cyber Security
Most known security vulnerabilities
Security Vulnerabilities MOST EXPLOITED SECURITY VULNERABILITIES FROM 2016 TO 2019 ARE LISTED BELOW: 1. CVE-2017-11882
Pianalytix - Sneha



Cyber Security
Laws against Cyber Crimes
What is a crime and how is it associated with Cybersecurity and Information Technology? Crime
Pianalytix - Sneha



Cyber Security
Malware Threats
WHAT ARE MALWARE? Malware is basically ‘MALicious softWARES’ which are used intentionally to cause damage
Pianalytix - Sneha



Cyber Security
Introduction to IoT penetration testing
WHAT IS IOT? The Internet of things describes the network of physical objects that are
Pianalytix - Sneha



Cyber Security
Introduction to OWASP ZAP
What is OWASP Zap? OWASP ZAP (short for Zed Attack Proxy) is an open-source web
Pianalytix - Sneha



Cyber Security
Steganography
Steganography is the art of hiding something inside something else, for example, A text message
Pianalytix - Sneha



Cyber Security
Tor and proxychains
Tor (The Onion Router) Tor is a free and open-source software for anonymous communication and
Pianalytix - Sneha



Cyber Security
Krack Attack
Find out more about Krack Attack below. We all rely pretty much on Wi-Fi. We
Pianalytix - Sneha