vietyork

Founder & CEO @ Lectron, Inc.

Are you worried about unknown SMS Scams? phishing scams explained ( Smishing )

Are you worried about unknown SMS Scams? phishing scams explained ( Smishing )

Are you accustomed to the crime of stealing sensitive information? Even if you don’t know the details, most of us have heard it once – an unexpected email that seems harmless at first but doesn’t seem right at first glance. These emails are sent by cybercriminals and usually contain malware or malicious attachments that, if […]

Have you ever thinked about the future of DDoS Attacks?

Have you ever thinked about the future of DDoS Attacks?

As the term ‘Resilient’ suggests, DDoS mitigation solutions do not prepare for sudden attacks; they become accustomed to and recover from DDoS attacks after a hit. Many businesses rely on their DDoS protection at the hands of DDoS mitigation vendors who offer DDoS mitigation solutions. Still, these robust DDoS solutions have no way of detecting […]

SYN Flood Attack

SYN Flood Attack

What is a SYN Flood DDoS Attack? SYN (Sync) flooding, often caused by botnets, is an attack method that identifies server resources via firewall or perimeter defense. The attack aims to use connectivity resources for backend servers and stateful devices, such as firewalls and loading balancers, by sending multiple TCP-SYN applications to targeted services while […]

You’re Not A Genius For Pirating Software

You’re Not A Genius For Pirating Software

Existence of linux many people swear by linux and claim that it’s way better than windows, i’ve never used linux but considering that microsoft gave in on the cloud market and uses linux to run azure I think it’s pretty safe to assume that linux is quite good even if linux is only 70 or […]

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP)

What is the Internet Control Message Protocol (ICMP)? Internet Control Message Protocol (ICMP) is a protocol used by networks to communicate problems with data transmission. In this definition of ICMP, one of the main ways ICMP is used is to determine whether the data reaches its destination and at the right time. This makes ICMP […]

NTP amplification DDoS attack

NTP amplification DDoS attack

What is an NTP expansion attack? NTP attack to increase power-based attacks (DDoS). The attacker uses the Network Time Protocol (NTP) server to terminate a network or server targeted with increased UDP traffic, making the target and surrounding infrastructure inaccessible to regular traffic. How does an NTP augmentation attack work? All scalability attacks exploit bandwidth […]

How a computer can be infected and be part of a DDoS botnet

How a computer can be infected and be part of a DDoS botnet

In computer use, a zombie is a computer connected to a network that has been compromised by a virus, virus, or Trojan. It can be used remotely for malicious activities. Most owners of zombie computers do not realize that their system is used in this way, which is why they are compared to the living […]

Cryptocurrency Attacks

Cryptocurrency Attacks

What is a cryptocurrency? A cryptocurrency is a digital currency system with two main variations that distinguish it from traditional currencies. First, cryptocurrency is not tied to or sponsored by any government, making it a truly international currency. Second, cryptocurrency is constantly being distributed. What is blockchain? A blockchain is a digital, public book that […]

OWASP

OWASP

What is OWASP? Open Web Application Security Project (OWASP) is a non-profit foundation dedicated to improving software security. OWASP operates under the ‘open community model, where anyone can participate and contribute to projects, events, online discussions, and more. OWASP’s guiding principle is that all materials and information are freely available and accessible on their website […]

What is Anycast?

What is Anycast?

Anycast is a way of communicating with a network where incoming requests can be sent to various locations or “nodes.” In the case of a CDN, Anycast sets up incoming traffic routes to the nearest data center to process the application efficiently. The selected route allows the Anycast network to be more tolerant in the […]