Author: DICC Institute

21 September 2021

What is the Currency Market

Many people reading this article must not be aware of the Currency Market and how it functions in the real world. The currency market is also known as the Foreign exchange market which is a one-stop marketplace consisting of different currencies which can be bought and sold by people coming from all over the world. These people participate in this exchange market operating in a […]

19 August 2021

Types of Hackers

Computers and the Internet have radically altered the world’s working environment. All of our data has been transferred from records and ledgers to computers as computers have taken over a large part of our lives. While this work shift has reduced physical strain on employees, it has also increased the risk of data theft. Hackers are knowledgeable people with bad intentions who are involved in […]

26 June 2021

How to become a Cyber security Expert?

A cyber security expert, also known as a cyber intelligence officer, is in high demand on the job market all over the world. Anyone who is proficient with computers could potentially be a good fit for this position. Cyber security may appear to be a difficult field to break into at first, but skilled cyber security experts are in high demand, and it can be […]

26 June 2021

How to use Indicators and Oscillators in Technical Analysis

If you are interested in doing some investment in the market and if your kind of serious about the whole concept of investing then you must be undergoing proper research about the market. In such a situation it does not matter if you are a rookie or an experienced trader you will surely go through the graph to recognize what’s going on in the market […]

22 June 2021

Bull Market vs Bear Market

The stock market of any country is one of the most important aspects in the world just like the heartbeat which is important for the survival of the human being. The market can even be described as volatile in many possible cases and that is the reason it depends on various possible circumstances. You must already be aware of the stock market position as sometimes […]

18 June 2021

Difference between Vulnerability Scanning and Penetration Testing

Penetration and vulnerability scanning are two key security services to highlight your business in  security’s weaker areas so they can be corrected prior to a cybersecurity incident. As a result, penetrating tests and vulnerability scanning for the same service are often confused and terms are used interchangeably. This can cause problems, as companies can finally invest in one service if they really need the other. […]

18 June 2021

How API Attacks work and how can we prevent them?

API attack is nothing but a hostage usage or can even be termed as an attempted hostile usage of the present API. There are several ways through which attackers can misuse your API. The main part that is mostly targeted is the API endpoint that is highly considered to be misused every time such a situation is been encountered. Lets us see the few ways […]

18 June 2021

Social Engineering in Penetration Testing

Many of us not aware of the term social engineering in penetration testing this is nothing but a technique that is used by most ethical hackers to test the social engineering tactics for any organization employees basically to understand all about the security posture and also where all the vulnerabilities lie. In this way, it would be able to explore the main objective of the […]

18 June 2021

How to prevent Brute Force Attack

Many of us are already aware of what is a brute force attack. Just as a note to remember this the brute force attack is arguably the simplest form of all the cyber-attack as well as the hacking methods. However, the main idea behind all this is quite simple to understand. For instance, if you have an unlimited number of trials to guess a password […]

18 June 2021

Buffer Overflow Attack and its Prevention

Buffer Overflow An information security or programming problem occurs when a programme writes data to a buffer but overshoots the buffer’s boundary, resulting in data overwriting memory locations that are adjacent to the buffer. Buffers are memory storage regions that temporarily hold data while it is being transferred from one location to another. As a result, the programme attempting to write the data to the […]