Post Profile

How To Use Memcached To Stop Brute Force Attacks

Brute force attacks are most common attacks on websites. This is the first approach any hacker takes to get maximum return on a hacking attempt. Every year thousands of online accounts are compromised using this technique. The brute force attack is performed using a bot with weak password list. Most people like to use simple to guess passwords and these passwords are easily compromised by a simple bot.
read more


Related Posts

Cyber criminals attempt to hack into AT&T, no accounts compromised

Technology : Venture Beat

AT&T was the target of an attack today, when cyber criminals attempted to access customer information by connecting phone numbers to online accounts. The company explained the attack was “an organized attempt to obtain information,”...

How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts

Technology : Vice: Motherboard

New evidence proves Russian hackers were behind the hack on Podesta, connecting the dots on different parts of the complex hacking campaign.

Thousands of CCTV Cameras Hijacked By Hackers to Attack Bank Websites

Technology : News Week: Technology and Science

Thousands of web-connected CCTV cameras and webcams have been taken over by hackers to carry out cyber attacks on government department websites and online banks. The network of compromised cameras was uncovered by researchers at se...

WiFi Protected Setup PIN Brute Force Vulnerability Discovered

Technology :

Attackers who try to brute force accounts to get system passwords have several options at hand to reduce the time it takes until passwords are found. Most nowadays test the passwords against a dictionary file containing commonly use...

Hosting Providers Suspect Botnet Behind WordPress and Joomla Brute Force Attacks, Security Firm Says Attempts Have Tripled

Technology : The Next Web Blog

Hosting providers around the world are seeing a massive increase in brute force attacks against WordPress and Joomla sites. Attackers are looking to gain access to and compromise accounts, but... Keep reading ?


Copyright © 2016 Regator, LLC