Category: Network Security

Certificate Pinning

Certificate pinning is a security technique used to ensure that a website or app only communicates with trusted servers. It works by storing a copy of the server’s digital certificate or public key within the app or client. When the app connects to a server, it checks that the server’s certificate matches the stored one….

Packet Capture Analysis

Packet capture analysis is the process of collecting and examining data packets as they travel across a computer network. By capturing these packets, analysts can see the exact information being sent and received, including details about protocols, sources, destinations, and content. This helps identify network issues, security threats, or performance problems by providing a clear…

Route Origin Validation

Route Origin Validation is a security process used in internet routing to check if the organisation announcing a particular block of IP addresses is authorised to do so. It helps prevent accidental or malicious rerouting of data by verifying the legitimacy of route announcements. This process relies on a system where network owners register which…

BGP Hijacking Mitigation

BGP hijacking mitigation refers to the set of methods and practices used to prevent or reduce the risk of unauthorised redirection of internet traffic through the Border Gateway Protocol (BGP). BGP hijacking can allow attackers to reroute, intercept, or block data by falsely announcing ownership of IP address ranges. Mitigation techniques include route filtering, route…

DNSSEC Implementation

DNSSEC, or Domain Name System Security Extensions, is a set of security protocols added to the Domain Name System to protect users from certain types of cyber attacks. It works by digitally signing DNS data so that computers can verify it has not been tampered with during transmission. Implementing DNSSEC involves enabling these digital signatures…

Secure DNS Resolution

Secure DNS resolution is a method of ensuring that when a computer looks up the address of a website, the process is protected from spying, tampering, or redirection by attackers. This is achieved by encrypting the communication between your device and the DNS server, which translates website names into numerical addresses. Secure DNS resolution helps…

VPN Split Tunneling

VPN split tunnelling is a feature that lets you choose which internet traffic goes through your VPN connection and which uses your regular internet. Instead of sending all data through the secure VPN, you can decide that only specific apps or websites use the VPN, while the rest connect directly. This helps balance privacy with…