Tag

threats

0 views collected around this technical thread.

Raymond Ops
Raymond Ops
Dec 29, 2024 · Information Security

What Every Hacker Calls It: A Comprehensive Glossary of Cyber Threats

This article provides a detailed glossary of common hacking terms and techniques—from black‑hat attackers and backdoors to APTs, exploits, and dark‑web concepts—explaining each threat, its purpose, and how it impacts information security.

APTSecurityexploit
0 likes · 17 min read
What Every Hacker Calls It: A Comprehensive Glossary of Cyber Threats
Architecture Digest
Architecture Digest
Dec 27, 2016 · Information Security

IoT Security Overview: Architecture, Threats, and Protection Measures

This article provides a comprehensive overview of IoT security, detailing the IoT architecture—including cloud platforms, mobile clients, and hardware terminals—while analyzing major security threats such as insecure data storage, weak server controls, unencrypted transmission, client injection, improper authentication, key protection flaws, session mishandling, and sensitive data leakage.

Cloud PlatformHardwareIoT
0 likes · 15 min read
IoT Security Overview: Architecture, Threats, and Protection Measures