InfoCarnivore.com is your premier infographic website and directory. Browse high-quality infographics and instructographics and submit your own for inclusion.
Posts tagged "attack"
How Does Spam Worm It's Way Into The Social Media Web?

How Does Spam Worm It’s Way Into The Social Media Web?

If you use social media web sites then this guide will tell you what you need to know about spam worms and how they could lead to more critical attacks.
ATM Biometrics Coming to a Corner Store Near You!

ATM Biometrics Coming to a Corner Store Near You!

“Every person, place, and thing on this planet will be connected [to the iris system] within the next 10 years,” But what's happening now is Global Rainmakers Inc. (GRI), based out of New York City, has announced that it will use iris scanning technology to begin creating what it claims will be “the most secure city...

Passwords: Brute Force Attack on You

We've previously discussed guess attacks and dictionary attacks on your passwords. And we've determined now that password security is of the utmost importance. Just today I repaired a machine for a customer and their Vista login password was an old phone number of theirs. Seven digits that could easily be found with...

Passwords: Dictionary Attacks

dictionary attack password hack guess passwordHackers may already know your password. In a previous post, I wrote about guess attacks by hackers on your password. In this brief post I'm going to write about another method that an attacker could use to get your password. So by now, you've already made the...

What is a DDOS attack?

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or people to prevent an...

What is a zero day vulnerability?

The term zero day vulnerability (zero day attack or even zero day exploit) gets thrown around a lot in security circles. We often hear it in reports from security vendors regarding recently discovered threats. But what is a zero day vulnerability anyway? Perhaps a lot of ‘average’ computer users hear this term, but would like...