Expert Explanations

2016: The Year of DDoS Attacks

Last week, we discussed some of the main cyber-threats that occurred in 2016 and the lessons we can learn from them. The preeminent type of attack that occurred time and time again, was Distributed Denial of Service (DDoS). Amongst the most remarkable 2016 DDoS attacks were: Dyn, The US DNS service provider: For nearly 11 […]

date:  Feb 01, 2017 comments:  0
by:  Blog Author category:  All, Expert Explanations Read More

Understanding the Dark Web – Part 2

Last week, we talked about what the Dark Web is and the fact that it consists of untraceable, unsearchable websites that you need specific software, settings, approval and/or authority to access. Now, let’s focus on what is really happening on the dark web. What Is It Used For? Just like so many inventions before it, […]

date:  Dec 07, 2016 comments:  0
by:  Blog Author category:  All, Expert Explanations Read More

Understanding the Dark Web – Part 1

What is it? Simply put, the dark web is a network of untraceable online activity on websites that can only be accessed using encryption software. It is not indexed by Google, Bing, Yahoo or any other conventional search engine. Both websites and users of the dark web enjoy the protection of anonymity through strong cryptography. […]

date:  Nov 30, 2016 comments:  0
by:  Blog Author category:  All, Expert Explanations Read More

The Versatility of Bitcoin

Our Experts Explain Last month we published a few articles about Cryptocurrencies and Bitcoin. Did you know that Bitcoin can be used for more than just monetary purposes? Because Bitcoin utilises Blockchain technology (a public, distributed, synchronised and encrypted database), bitcoins themselves are very secure and can therefore be used to represent numerous pieces of […]

date:  Nov 23, 2016 comments:  0
by:  Blog Author category:  All, Expert Explanations Read More

What is… Cross-Site Scripting?

What is it? Cross-Site Scripting (XSS) is a type of attack where a cyber-criminal injects malicious scripts (aka a malicious payload) into a legitimate website or web application. Our Experts Explain XSS vulnerabilities occur when a web application accepts user input, and dynamically includes that data in the web pages it generates without first validating […]

date:  Nov 17, 2016 comments:  0
by:  Blog Author category:  All, Expert Explanations Read More

What are…Bitcoins?

What is it? Bitcoin was the first ever decentralised digital (or virtual) currency and is still the largest cryptocurrency in terms of total market value. The creator of Bitcoin, an unidentified software developer known as Satoshi Nakamoto, released a white paper in 2009, describing Bitcoin as, “A purely peer-to-peer version of electronic cash that would […]

date:  Oct 12, 2016 comments:  0
by:  Blog Author category:  All, Expert Explanations Read More

What is…Cryptocurrency?

What is it? A cryptocurrency is a medium of exchange, Australian Dollars for example, however it is designed for the purpose of exchanging digital information using the process of cryptography to secure transactions and to control the creation of new coins. Cryptocurrency is essentially digital, or virtual currency. Our Experts Explain Normal, centralised banking is […]

date:  Oct 06, 2016 comments:  0
by:  Blog Author category:  All, Expert Explanations Read More

What is… Card Skimming?

What is it? Card Skimming is the act of using a portable device to illegally collect data from the magnetic strip of a credit, debit or ATM card. Victims of credit card skimming are often unaware of the theft until they notice fraudulent charges on their accounts or discover that money has been withdrawn. Their […]

date:  Sep 21, 2016 comments:  0
by:  Blog Author category:  All, Expert Explanations Read More

What is a…PUP (Potentially Unwanted Program)?

What is it? A Potentially Unwanted Program, or PUP for short, is a program that may be unwanted, despite the fact that a user consented to download it. Some examples of PUPs include: spyware, adware, or additional web browser toolbars, and they are often downloaded in conjunction with a program that the user actually wants. […]

date:  Sep 14, 2016 comments:  0
by:  Blog Author category:  All, Expert Explanations Read More