Have you tried VPN before?

A VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more.

These days VPNs are really popular, but not for the reasons they were originally created. They originally were just a way to connect business networks together securely over the internet or allow you to access a business network from home.

VPNs essentially forward all your network traffic to the network, which is where the benefits — like accessing local network resources remotely and bypassing Internet censorship — all come from. Most operating systems have integrated VPN support.


Have you faced DDoS attacks before?

A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from banks to news websites, and present a major challenge to making sure people can publish and access important information.

Modern security technologies have developed mechanisms to defend against most forms of DoS attacks, but due to the unique characteristics of DDoS, it is still regarded as an elevated threat and is of higher concern to organizations that fear being targeted by such an attack.


How much do you know about ‘Botnet’?

A botnet is a collection of internet-connected devices infected by malware that allow hackers to control them. Cybercriminals use botnets to instigate botnet attacks, which include malicious activities such as credentials leaks, unauthorized access, data theft, and DDoS attacks.

Botnet owners can have access to several thousand computers at a time and can command them to carry out malicious activities. Cybercriminals initially gain access to these devices by using special Trojan viruses to attack the computers’ security systems, before implementing command and control software to enable them to carry out malicious activities on a large scale. These activities can be automated to encourage as many simultaneous attacks as possible.


KOL

With the arrival of new methods and strategies in the world of online marketing, we’ve also seen brand new definitions and terminologies appear. KOL is one of them.

KOL is an acronym for Key Opinion Leader. While we may be familiar with the concept of an influencer, KOL is a very similar and more commonly used term nowadays.

A KOL is someone who’s considered a connoisseur of a certain topic and whose opinions are respected by their public, thanks to their trajectory and the reputation they’ve built for themselves. For that reason, KOLs have gained the status of experts and are recognized as referential people within their fields. Their achievements and skills are well-known, giving them an aura of authority.


Do you know what is clickjacking?

Clickjacking, also known as a “UI redress attack”, is when an attacker uses multiple transparent layers to trick a user into clicking on a button or link on another page when they were intending to click on the top-level page. Thus, the attacker is “hijacking” clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both.

One of the most notorious examples of Clickjacking was an attack against the Adobe Flash plugin settings page. By loading this page into an invisible iframe, an attacker could trick a user into altering the security settings of Flash, permitting any Flash animation to utilize the computer’s microphone and camera.

Larus Foundation

Larus Foundation is an NGO that strives to increase public engagement amongst the youth, in the process of Internet Governance and Internet Policy.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store