As long as humans are involved in a company, its security will remain as foolproof as their behaviour. It’s...
Archive for category: Tech Brewery Staff
The Anatomy Of A Cyber Attack: An introduction to the most common types of cyberattacks.
Tech Brewery, , Cyber Security, Tech Brewery Staff, Cyberattacks, DOS, Drive by attack, Malware, Phishing, SOL Injection, XSS, 0 5 minute readIf all the people moved to the city, what would the thieves do in village? With increasing digitisation, cyber...
Hacking 101: How to set up Kali Linux and a brief introduction
Tech Brewery, , All about Hacking, Tech Brewery Staff, Install kali linux, Set up kali linux, 0 5 minute readHackers, aspiring hackers, techies, curious people, Mr. Robot fans, all of you! Pay attention. This is your where you...
23 commandments in Kali: The most useful Kali Linux commands
Tech Brewery, , All about Hacking, Tech Brewery Staff, commands, kali linux, 1 6 minute readPresenting to you the most basic and the most useful terminal commands in Kali Linux. May you learn them,...
Know where to look: 10 most useful OSINT tools for beginners
Tech Brewery, , Cyber Security, Tech Brewery Staff, OSINT, tools, Top 10 useful, 0 7 minute readThe world wide web is a deep space overflowing with data and a lot of it is public and...
Stop here for Metasploit: Learn how to tame the beast of hacking
Tech Brewery, , All about Hacking, Tech Brewery Staff, Learn Metasploit, 0By the end of this article, you will walk out with a working understanding of Metasploit. Your hands will...
Why 6.8 m Indian health records were stolen: Is healthcare the new target in town
Tech Brewery, , Crime Stories, Tech Brewery Staff, Health records stolen, Indian health records, 0Earlier this year in February, a shocking, but not uncommon cyber crime incident was unveiled to public, about a...
Why you shouldn’t choose cybersecurity as a career: Must read career guidance on cybersecurity
Tech Brewery, , Grow your Career, Tech Brewery Staff, Cyber security career, cyber security courses, jobs, scope, 0I don’t know if cybersecurity is the right thing for me. I don’t know if this field has enough...
What does that even mean: Decoding hacking jargon through 50 most common cybersecurity terms
Tech Brewery, , All about Hacking, Tech Brewery Staff, 50 most common, cyber security terms, Decoding hacking, 0 7 minute readHave you ever heard someone throw words like botnet, shell, zero day exploit, metadata in a conversation and simple...
How not to attract cyberattacks: Online Security Training for netizens
Tech Brewery, , Cyber Security, Tech Brewery Staff, Cyber attacks, Online security training, 0 6 minute readThe internet is a hot commodity in the 21st century. Everyone wants to get on the online bandwagon and...