TechLife

Network attacks

Though less common than malware and social engineering, network-based attacks are still a threat to every computer and mobile user, and everyone should have at least a basic understanding of what they are and how to avoid them. So this month let’s look at how these attacks work, and what you can do to guard against them.

Nmap/port scanning

Port scanning, most commonly done through an app called Nmap, is not an attack per se. It’s an attempt to check your system for attack vectors by seeing which ports you have open on your router and therefore what servers you might have running on your network. Then they can tailor an attack to that kind of server.

For example, if you

You’re reading a preview, subscribe to read more.

More from TechLife

TechLife1 min read
Going Rogue
Rogue Amoeba makes some great apps, and its Audio Hijack app has evolved from sporting an Aqua interface in 2002 to the distinctive look and feel of the newly launched Audio Hijack. We spoke to founder Paul Kafasis and designer Neale Van Fleet about
TechLife2 min read
NASA Caught A Dead Star Spewing Antimatter
A small pulsar belched out an enormous beam of matter and antimatter particles that streamed for 40 trillion miles across the Milky Way. Astronomers detected the cosmic particle trail in images captured in X-rays by NASA’s Chandra X-ray Observatory i
TechLife2 min read
Ridiculous Tech
Who doesn’t want shoes that you can verify on the Blockchain? US$249 | kck.st/3kyIxyz There’s not really any clues on the Kickstarter page as to why this crowdfunded shoe company decided to use the very late Italian mathematician Leonardo Bonacci’s

Related Books & Audiobooks