Category: Ethical Hacking

Find out here the latest updates and information about ethical hacking, cyber security, IT Security and other related stuff of DICC.

7 February 2023

Ethical Hackers Earn More Than $1 Million These Days.

You know what ethical hackers are and many of them are earning over $1 million these days. I will tell you a little more about this subject, and the hacker definitions to better contextualize. Prepared? While many professions suffer from the current situation in the world, these professionals are enjoying this phase very well.  Above all, this billing grew exponentially during the pandemic. The term […]

7 February 2023

EC-Council The Best Ethical Hacker Certification In CyberSecurity.

EC-Council: Meet the global leader in cybersecurity education. EC-Council is the most prestigious and renowned certifier of ethical hackers in the world. In fact, every cybersecurity professional knows that if they don’t have certification, they know that this is one of the prerequisites for anyone who wants to be an authority in the area. EC Council is responsible for and developer of the world famous EC-Council […]

7 February 2023

Cybersecurity tools.

Cybersecurity tools are great strategies to help keep you safe. CyberSecurity software is essential for the cyber security and privacy of a company or individual.  Cyber ​​security is the method used to protect the network, system or applications from cyber attacks. So it is used to prevent unauthorized access to data, cyber attacks and identity theft. Application security, information security, network security, disaster recovery, operational security, etc. However, […]

1 February 2023

Cyber Security Taught By The Movie “Avengers”.

Marvel has been entertaining us for the last 20 years, and nothing better if we still manage to enjoy it with knowledge. So let’s see what Avengers can teach us about cybersecurity.  Come on, I’ll explain… We’ve seen gods, super soldiers, magicians and other irradiated heroes battle villains on galactic scales.  The eternal struggle of good against evil. That is, as in cybersecurity, ethical hackers fight cyber criminals. In […]

1 February 2023

Cyber Bulling Is Different From Face To Face Bulling.

Harassment, also called bullying, is a global problem that has always been present: it occurs in schools , offices and even in homes. The problem has been addressed by the police, school officials, governments, and various non-profit organizations alike. However, with the adoption of digital technology, a problem that existed only in the physical world spread to the online realm, and cyberbullying has become so widespread that the English […]

1 February 2023

Cryptography In Computer Science

Learn how encryption can be used by cybersecurity professionals to prevent attacks and data breaches. Today, encryption is about the study of secure communication techniques that allow only the sender and recipient to view their content.  What is encryption? The etymology is “kryptos” which means “hidden” in Greek. It is closely related to the act of encoding text called cipher text and returning it to the original text. As […]

1 February 2023

Computer Forensics.

First, computer forensics is a method of manipulating computer evidence to obtain information for criminal investigation. It basically consists of three parts. Data Acquisition  It is the safe process to get data from the original source without damaging or modifying it. However, there are several tools to do this, depending on the operating system and other details, such as the state of the evidence. But we will […]

31 January 2023

Cloud Cyber Security.

Learn ways to ensure the cloud doesn’t cast a shadow over your cybersecurity The digital transformation accelerated by the pandemic means more demand for cloud services. The increasing complexity of cloud computing has opened up more security holes. So traditional cybersecurity must be complemented by cloud-native solutions. We are now more than a year into the coronavirus pandemic, which has transformed the way we do business. For […]

31 January 2023

Capture The Flag.

When in CTF competitions, the flag is usually a part or snippet of code, even a piece of hardware, the competition can progress to a series of questions. In this sense, get more inside what CTF is and how to play! So what is CTF? The CTF which stands for Capture the Flag or “Capture the Flag” is a type of competition that pertains to […]

31 January 2023

Best Tools For Bug Bounty.

Bug Bounty is a program maintained by several companies that pay cybersecurity researchers for flaws found in their applications. These failures reported by the researchers are evaluated according to the level of criticality for the business, and then a financial reward is paid to the researcher. In other words, it’s like having a team of “good hackers” working directly on the security evolution of the solutions that companies create. Entering this […]