Penta Security’s

Cyber Security Blog

Bringing you the trending topics and news of the IT-security industry.

dark web

Which Industry Is Most Vulnerable To Hacks?

Previously, we discussed the different industries that are targeted for DDoS attacks. Below, we’ll begin by pointing out some interesting industry facts… like which industry is the most vulnerable industry when it comes to hacking attacks. Then we’ll take a look at some examples of how hackers like to get creative with their revenue strategies. […]

error

Reflection Attacks and Amplification Attacks

Here are two types of attacks that are intended to monopolize your system’s resources. Reflection Attacks Reflection attacks are attacks that use the same protocol in both directions. The attacker spoofs the victim’s IP address and sends a request for information via UDP to servers known to respond to that type of request. The server […]

e-commerce-402822_1280 (1)

Holiday Cyber Security Tips – Santa, Sales… but what about Security?

From Black Friday to New Year’s Eve… It’s that time of year again. Halloween is over and after the candy wrappers have been hidden and the costumes have gone on clearance, storefronts get ready for the holiday season. Starting with Thanksgiving and Black Friday, all the way to Christmas and New Year’s Eve, it’s a […]

botnet

Attack Agents and Bots

One of the critical parts of a successful DDoS attack relies on bots or a botnet. Botnets are groups of zombie computers under the remote control of an attacker via a command and control server (C&C Server). These zombie computers are highly useful as they are used to carry out commands on a whim and […]

open-sign-1309682_1280 (1) (1) (1)

PCI DSS and the Road to Compliance

When you’re in the world of cyber security and researching new products, there’s no doubt that you’ll run into a plethora of acronyms. With the large amounts of advanced technology and the technical terms there are, it’s easier to shorten them to save some time and space. However, sometimes all the terminology begins to run […]

Cloudbric as a one-stop wall of security

Why You Need a Firewall

Your Website is Published. Is it Good to Go?   According to the Netcraft January 2015 web server survey, there are over 876 million websites all around the world. Among them, however, 30,000 websites are hacked each day and the majority of these websites are legitimate small businesses that are irrelevant to cyber criminals. Why is […]

Disclaimer: Unless otherwise noted, Penta Security Systems Inc. is the legal copyright holder of all the material on this blog. Others cannot and should not reprint or publish without Penta Security’s written consent. For inquiries about guest writing or hosting, please contact Penta Security. We reserve the right to change the focus of the blog, shut it down, or chance the terms of use at discretion. All information taken from Penta Security’s cyber security blog and/or applied is at the reader’s own risk. Information is for entertainment and knowledge distribution purposes only. This cyber security blog should not be taken as medical, legal, or other professional advice. Please understand that using any information from the cyber security blog should be done at your own risk. Penta Security does not take any personal or contact information to sell to third-parties. However, we are not liable for the privacy practices of any of our advertisers or blog commentators. When moving from this page to another sponsored page, we are not responsible for any issues. We thank you for your interest in our cyber security blog.