Category Archives: White Papers

Home use Wireless Routers – Are they safe?

Wireless router

Threat description One of the most common questions I am asked regarding home use wireless routers is “What is the risk if someone uses my Internet connection?” The answer below highlights the concerns, some of which are critical.Is it just free internet they are after or is something else at work here? …

Read more

Fighting Identity Theft and Social Engineering Techniques

Identity theft in word tag cloud

Identity theft occurs when someone represents themselves as you and then enters into one or more transactions on your behalf. They can open a bank account, apply for a credit card, apply for a passport or other government ID, and they can even steal your house – selling it while …

Read more

Cyber Security – Past, Present and Future

Secure Laptop

Threat description When one takes a penetrating look at the components of computer crime it reveals itself to be the same as any other crime. There’s an attacker and a victim, and the attacker requires the same three components to be successful – Motive, Opportunity and Means (MOM). In recent …

Read more

File Intrusion

Virus Scan Icon

Threat description An intruder file is introduced into the hosted web site through an invasive file submission. This threat can be executed very simply through a short HTML form (3 lines!). This is a less common but highly impactful attack. Any file of any type can be introduced in this …

Read more

SQL injection exploits – The full story

Cloning - injecting DNA

SQL Injection attacks pose a direct threat to the database layer in an application. They enable hackers to steal vital information from organizations. In the case of ASP SQL injection, due to inefficient or lax application of security within the web application, the hacker is allowed to inject an SQL command in …

Read more

Undefeatable Password

You and Your Password You might have heard the term “Strong Password” and may have wondered what it meant. Strong implies that it is more difficult to compromise and making it a stronger password is fairly easy to do. First we would like to lay out a few background facts …

Read more

Software Life Cycle

The Software Life Cycle as six stage process by which new software is build and maintained. Initiation – project is defined. Analysis – functional and physical characteristics are defined. System Specification – hardware specifications defined. Design and Development – code is being created. Implementation – product being implemented. Maintenance – …

Read more

IT Security Articles – Penetration Testing

1) Web Application Penetration Testing A Web Application Penetration Testing is concerned with evaluating the security of various web applications. A malicious user called Black Hat Hacker or Cracker is used for bringing about a false attack on the system. This helps in determining the possible threats to the computer system, thus …

Read more

IT Security for Spear Phishing

Phishing.  It’s been a hot topic and the focus of IT security services companies for a long time.  What is it?  Phishing is a way of acquiring information including, usernames, passwords, and credit card details, as well as other personal information through methods that are masquerades for trustworthy entities.  For example, emails …

Read more

Need More Info? Call Us (888) 834-8932

Contact Us

© 2012 Toronto Professional services LTD. All rights reserved