• Email:contact@dwisesoft.com
  • phone:+1(438)492-7278

A man-in-the-middle (MitM) attack is when an attacker intercepts communications between two parties to anonymously eavesdrop or modify data.

DoS & DDoS attack – How does it work?

DoS (Denial of Service) or DDoS (Distributed Denial of Service) attacks are attacks whose main purpose is to harm others. Indeed, these attacks aim at making the target system unusable. Either by overloading it with requests, or by making it “crash”. When the attack comes from several simultaneous sources, it is called a Distributed Denial

Dictionary attack, How to hack a password

Disclaimer: Before I go into this article, I would like to stress that I do not encourage anyone to launch an attack on an account that does not belong to you. It is against the law and I am not responsible for any actions you may take. This content is strictly for educational purposes. Now

Types of cyber attacks

Individuals and SMEs are exposed to cyber attacks every single day. In reality, many people think that they are not at risk because they are either not very ‘attractive’ or impossible to reach. The question to ask yourself is when you will be attacked, not if you will be attacked. SMEs are all dependent on IT at one level

IT Security Fundamentals

Disclaimer: The purpose of this article is to provide information on the Fundamentals of IT Security. All information provided is for educational purposes only and not intended to encourage any unlawful acts. These are my personal writings and i will not be liable for any actions you may take as a result of reading this

COVID-19: A new opportunity for hackers.

As it is often said, in a time of crisis, you have some people whining while others find opportunities and « hackers » understand that. For some time now there has been misinformation circulating to exploit people’s concern about the virus that is ravaging. They use cunning and social engineering to get confidential information, credit card numbers

Recent Posts