<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Remi</title>
    <description>The latest articles on DEV Community by Remi (@remitache).</description>
    <link>https://dev.to/remitache</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F530394%2F586ccb95-cf10-41a4-915a-5b800454142f.png</url>
      <title>DEV Community: Remi</title>
      <link>https://dev.to/remitache</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/remitache"/>
    <language>en</language>
    <item>
      <title>SEO: How to optimize your ranking on ChatGPT Search</title>
      <dc:creator>Remi</dc:creator>
      <pubDate>Fri, 08 Nov 2024 10:00:45 +0000</pubDate>
      <link>https://dev.to/pixiumdigital/seo-how-to-optimize-your-ranking-on-chatgpt-search-3m22</link>
      <guid>https://dev.to/pixiumdigital/seo-how-to-optimize-your-ranking-on-chatgpt-search-3m22</guid>
      <description>&lt;p&gt;Discover some best practices to ensure good ranking on ChatGPT Search, OpenAI's new search engine.&lt;/p&gt;

&lt;p&gt;With the launch of its search engine, ChatGPT Search, OpenAI has made a significant impact. While the tool is still far from matching the performance of Google, which has dominated the market for over two decades, it represents a competitor that the Mountain View firm hasn't faced in a long time. For SEO professionals, ChatGPT Search offers a new playing field that could generate substantial traffic to websites, especially thanks to the citations included in its responses.&lt;/p&gt;

&lt;p&gt;Although all the specifics of its functionality haven't been revealed yet, there are still some best practices to adopt to improve your ranking. Here's what we know.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3r505waipjgjhhblytl6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3r505waipjgjhhblytl6.png" alt="Example of ChatGPT search" width="800" height="470"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  How does ChatGPT search works?
&lt;/h2&gt;

&lt;p&gt;ChatGPT incorporates two technologies: Microsoft's Bing search index and OpenAI’s proprietary solution. The latter combines the chatbot's two latest language models: GPT-4o and o1-preview. OpenAI’s &lt;a href="https://platform.openai.com/docs/bots/overview-of-openai-crawlers" rel="noopener noreferrer"&gt;technical documentation&lt;/a&gt; lists three distinct crawlers:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;OAI-SearchBot: This is the primary crawler for search functions, indexing content to improve site visibility in OpenAI's results.&lt;/li&gt;
&lt;li&gt;ChatGPT-User: This crawler responds to user requests in real-time, enabling direct interactions with external applications.&lt;/li&gt;
&lt;li&gt;GPTBot: GPTBot is dedicated to training the AI models.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Ensure your site's indexing by ChatGPT Search
&lt;/h2&gt;

&lt;p&gt;Considering the previously mentioned elements, it is essential to facilitate the indexing of your site by ChatGPT Search. First, &lt;strong&gt;make sure to configure your robots.txt file&lt;/strong&gt; to allow access for both OAI-SearchBot and ChatGPT-User. GPTBot, on the other hand, can be blocked without affecting your search visibility. A possible solution if you prefer not to have your content used for model training.&lt;/p&gt;

&lt;p&gt;Bing’s technology could contribute a significant portion of traffic, as many SEO specialists have observed strong similarities between article rankings on both platforms. Therefore, it is also crucial to ensure good indexing of your site on Bing. A clear site architecture will also be beneficial.&lt;/p&gt;

&lt;p&gt;'For search results, please note that it may take around 24 hours between a site’s robots.txt file update and our systems adapting,' specifies OpenAI.&lt;/p&gt;

&lt;h2&gt;
  
  
  Content: How to appeal to ChatGPT Search?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Send Signals of Reliability
&lt;/h3&gt;

&lt;p&gt;When it comes to content, ChatGPT's new search engine emphasizes the reliability of sources. Aware of the concerns that an AI-based search engine could raise, particularly due to the hallucinations that the chatbot sometimes generates, OpenAI has partnered with numerous reputable media outlets to strengthen its credibility. Citing your sources and, conversely, &lt;strong&gt;having your articles referenced&lt;/strong&gt; across various media outlets, websites, or social networks will send a positive signal to the search engine.&lt;/p&gt;

&lt;p&gt;ChatGPT also &lt;strong&gt;prioritizes up-to-date content&lt;/strong&gt;. Therefore, it is essential to regularly update your articles, especially if they cover trending news.&lt;/p&gt;

&lt;h3&gt;
  
  
  Optimize Your Content for Bing
&lt;/h3&gt;

&lt;p&gt;If your articles rank well on Bing, there's a good chance they'll perform well on ChatGPT Search too. Fortunately, Bing's content recommendations are similar to those of Google. On its &lt;a href="https://www.bing.com/webmasters/help/webmasters-guidelines-30fba23a" rel="noopener noreferrer"&gt;Webmaster Tools page&lt;/a&gt;, Bing suggests the following practices:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Create Content for Users: The priority is still rich content based on keyword research, meeting visitor expectations rather than catering to search engines.&lt;/li&gt;
&lt;li&gt;Publish Unique Content: The content should be original to your site.&lt;/li&gt;
&lt;li&gt;Use Optimized Media: Original images and videos relevant to the topic increase engagement. For accessibility, Bing recommends using captions and alt text. Optimizing formats will also help with page load times.
Conversely, like Google, Bing warns against Black Hat SEO practices, such as cloaking, duplicate content, link buying, or affiliate programs without added value.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Consider Local SEO
&lt;/h3&gt;

&lt;p&gt;For local searches, ChatGPT provides an interactive map. Places and establishments are selected based on articles from regional daily news, tourism offices, websites specializing in events and activities, or platforms like TripAdvisor. If you operate a local business, being featured in online rankings could secure a good position on ChatGPT Search.&lt;/p&gt;

</description>
      <category>seo</category>
      <category>chatgpt</category>
      <category>website</category>
      <category>ai</category>
    </item>
    <item>
      <title>Discovery: Screenity - A powerful open-source screen capture tool</title>
      <dc:creator>Remi</dc:creator>
      <pubDate>Mon, 04 Nov 2024 10:36:41 +0000</pubDate>
      <link>https://dev.to/pixiumdigital/discovery-screenity-a-powerful-open-source-screen-capture-tool-3in</link>
      <guid>https://dev.to/pixiumdigital/discovery-screenity-a-powerful-open-source-screen-capture-tool-3in</guid>
      <description>&lt;p&gt;Looking for a powerful screen capture tool that respects your privacy?&lt;/p&gt;

&lt;p&gt;Let me introduce you to &lt;a href="https://screenity.io/en/" rel="noopener noreferrer"&gt;Screenity&lt;/a&gt;, an open-source Chrome extension that enables almost anything you can imagine in terms of video capture:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Record your current tab, a specific area, your entire desktop, any application, and even your webcam&lt;/li&gt;
&lt;li&gt;Capture audio from your microphone or the internal sound from your computer&lt;/li&gt;
&lt;li&gt;Annotate videos in real-time by drawing, adding text, arrows, shapes, and more&lt;/li&gt;
&lt;li&gt;Use virtual backgrounds and AI-based blur effects to enhance webcam recordings&lt;/li&gt;
&lt;li&gt;Smoothly zoom during recording to highlight specific details&lt;/li&gt;
&lt;li&gt;Blur certain areas to hide sensitive information&lt;/li&gt;
&lt;li&gt;Highlight clicks and mouse movements&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;But that’s not all! Screenity also includes a full video editor to refine your recordings after capture:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Trim, crop, and resize your videos&lt;/li&gt;
&lt;li&gt;Add or remove audio tracks&lt;/li&gt;
&lt;li&gt;Export in MP4, GIF, or WEBM formats&lt;/li&gt;
&lt;li&gt;Directly upload to Google Drive for easy sharing&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You can even set timers to automatically stop recordings after a defined period—handy for avoiding accidental hours of footage!&lt;/p&gt;

&lt;p&gt;Since its launch, Screenity has gained great popularity, with over 100,000 users. The tool is available in 18 languages and is actively maintained by its creator, &lt;a href="https://www.alyssax.com" rel="noopener noreferrer"&gt;Alyssa X&lt;/a&gt;, with contributions from the community.&lt;/p&gt;

&lt;p&gt;With this tool, your recordings stay on your machine, and no data is collected by any third party. You can even use the extension completely offline if you prefer.&lt;/p&gt;

&lt;p&gt;To try Screenity for yourself, it’s simple. Head to the &lt;a href="https://chromewebstore.google.com/detail/screenity-screen-recorder/kbbdabhdfibnancpjfhlkhafgdilcnji" rel="noopener noreferrer"&gt;Chrome Web Store&lt;/a&gt; to install the extension in just a few clicks. It’s a lightweight tool, only about 17 MB.&lt;/p&gt;

&lt;p&gt;Once installed, you’ll see the Screenity icon appear next to your address bar. Click it to open the control panel and choose your capture mode. Be sure to allow access to the microphone and webcam to unlock all features.&lt;/p&gt;

&lt;p&gt;You can also self-host Screenity by downloading the source code from &lt;a href="https://github.com/alyssaxuu/screenity" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;. In this case, you’ll need to manually load the extension in Chrome in developer mode. Detailed steps are provided in the repository’s README file.&lt;/p&gt;

&lt;p&gt;In short, whether you’re a trainer, developer, marketer, gamer, or just curious, I encourage you to give &lt;a href="https://screenity.io/en/" rel="noopener noreferrer"&gt;Screenity&lt;/a&gt; a try!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbhotuud8pyv3ictc58xe.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbhotuud8pyv3ictc58xe.png" alt="Screen recording" width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Faav5mi3kv9c36e821qpt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Faav5mi3kv9c36e821qpt.png" alt="Annotate, zoom, blur" width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuasx1pk07l1p0l78q930.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuasx1pk07l1p0l78q930.png" alt="Edit recording" width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwyeww8rwe7p71gy9igiv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwyeww8rwe7p71gy9igiv.png" alt="Screen recording solution" width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>productivity</category>
      <category>software</category>
      <category>opensource</category>
    </item>
    <item>
      <title>Web Development with AI: Dismantling the Future</title>
      <dc:creator>Remi</dc:creator>
      <pubDate>Wed, 23 Oct 2024 14:41:42 +0000</pubDate>
      <link>https://dev.to/pixiumdigital/web-development-with-ai-dismantling-the-future-36ec</link>
      <guid>https://dev.to/pixiumdigital/web-development-with-ai-dismantling-the-future-36ec</guid>
      <description>&lt;p&gt;In today’s digital era, the rapid advancement of technology continues to drive innovation, with one of the most significant breakthroughs being Artificial Intelligence (AI). Across various industries, AI is making a major impact, especially in web development.&lt;/p&gt;

&lt;p&gt;Traditionally, web development involved manual coding and extensive testing. However, the emergence of AI has transformed this process. By utilizing advanced algorithms and data analysis, AI helps create websites that are not only visually appealing but also functionally sound and user-focused.&lt;/p&gt;

&lt;p&gt;AI's evolution marks a major shift in web development, affecting everything from design and user experience to accessibility and search engine optimization (SEO). This shift unlocks new possibilities, enabling developers to build more engaging, interactive, and personalized digital experiences.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Role of AI in Web Development
&lt;/h2&gt;

&lt;p&gt;Incorporating AI into web development is more than just a trend—it’s a necessity in today’s fast-paced, digital-centric world. AI tools offer numerous advantages for developers and businesses, such as automating routine tasks, thereby reducing the time and effort required for web development.&lt;/p&gt;

&lt;p&gt;More importantly, AI tools elevate website functionality by offering personalized user experiences. They can analyze user behavior to present tailored content, recommend products or services, and even respond to real-time queries via AI-driven chatbots.&lt;/p&gt;

&lt;p&gt;That’s not all. AI tools also enhance a website’s search engine visibility by assisting developers in following SEO best practices. As a result, integrating AI into web development is essential for building dynamic, user-friendly, and highly optimized websites that promote business growth.&lt;/p&gt;

&lt;h2&gt;
  
  
  Understanding the Role of AI in Web Development
&lt;/h2&gt;

&lt;p&gt;Artificial Intelligence (AI) has opened up a new world of opportunities in web development, offering far more than just a technological trend. It's about improving efficiency, productivity, and user experience, with AI tools playing a pivotal role in this transformation.&lt;/p&gt;

&lt;p&gt;These tools enable developers to automate repetitive tasks such as code generation, error detection, and even layout design. For example, AI-powered design assistants can create visually appealing, responsive web templates based on user preferences.&lt;/p&gt;

&lt;p&gt;In terms of coding, AI tools can autocomplete code, drastically reducing development time. By streamlining web development processes, AI allows developers to focus on more complex tasks, ultimately improving the quality of the final product.&lt;/p&gt;

&lt;h1&gt;
  
  
  Applications of AI in Web Development
&lt;/h1&gt;

&lt;p&gt;AI extends its reach far beyond design and coding, influencing many other aspects of web development. One notable application is the AI-powered chatbot, which enhances customer service by providing real-time, personalized responses to user inquiries.&lt;/p&gt;

&lt;p&gt;With the integration of Natural Language Processing (NLP), these chatbots can understand and communicate in human language, offering an experience that feels natural and conversational.&lt;/p&gt;

&lt;p&gt;Another key area where AI is applied in web development is in creating personalized user experiences. AI-driven tools analyze user behavior, preferences, and interaction patterns to deliver tailored content and recommendations. This not only increases user engagement but also boosts the likelihood of conversions. As AI continues to evolve, its applications in web development will likely expand, redefining the way websites are built and experienced.&lt;/p&gt;

&lt;h2&gt;
  
  
  In-Depth Look at AI in Web Development
&lt;/h2&gt;

&lt;p&gt;Artificial Intelligence (AI) and its tools have become crucial elements in modern web development, revolutionizing the industry. AI-powered chatbots, for example, play a key role in enhancing user engagement by offering real-time assistance, answering questions, and even processing transactions, ultimately improving the overall user experience.&lt;/p&gt;

&lt;p&gt;AI tools are also instrumental in optimizing website design and performance. By automating repetitive tasks, they enable developers to concentrate on more complex aspects of the project. For instance, AI can analyze user interaction data to suggest layout and design improvements, helping to boost user engagement and conversion rates.&lt;/p&gt;

&lt;p&gt;Additionally, AI-powered analytics offer valuable insights into user behavior, paving the way for a more personalized and engaging experience. As we explore the various ways AI improves web development, it’s essential to recognize that effectively implementing AI requires a thorough understanding of the technology and its potential applications.&lt;/p&gt;

&lt;p&gt;This is where the expertise of a professional web development agency comes into play. A skilled agency with AI knowledge can help you harness its full potential, ensuring your website not only looks great but also performs optimally while delivering an exceptional user experience.&lt;/p&gt;

&lt;h2&gt;
  
  
  AI Tools in Web Development
&lt;/h2&gt;

&lt;p&gt;AI tools have evolved in web development from being used primarily in large-scale projects to becoming accessible resources for developers at all levels. Machine learning algorithms, a key component of AI, are commonly employed for tasks like data analysis, trend forecasting, and understanding user behavior, enabling the creation of more personalized and user-friendly websites.&lt;/p&gt;

&lt;p&gt;AI-driven development tools, such as automated design systems, use machine learning to generate design templates tailored to users' specific needs and preferences. AI coding assistants can offer code optimizations, detect bugs, and even anticipate where developers might require support.&lt;/p&gt;

&lt;p&gt;In addition, AI-powered testing tools can identify and diagnose issues more quickly and accurately than manual testing, drastically reducing the time needed for debugging and quality assurance.&lt;/p&gt;

&lt;h2&gt;
  
  
  Will AI Replace Web Developers?
&lt;/h2&gt;

&lt;p&gt;A frequently debated topic in the realms of Artificial Intelligence and web development is whether AI will eventually replace web developers. However, it's important to recognize that while AI can automate many tasks, it cannot replicate the creativity and problem-solving abilities of a human developer.&lt;/p&gt;

&lt;p&gt;A deep understanding of business objectives, the ability to address complex issues, and the innovation required for unique solutions are all aspects of web development that AI currently cannot replicate.&lt;/p&gt;

&lt;p&gt;As a result, while AI can greatly assist developers in their work, it's unlikely to fully replace them. Instead, the future of web development lies in the collaboration between AI and human expertise, combining the strengths of both for optimal results.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Importance of Web Developers Learning AI
&lt;/h2&gt;

&lt;p&gt;As AI continues to play a significant role in web development, it is becoming essential for web developers to understand and utilize this technology. Gaining knowledge in artificial intelligence enables developers to take advantage of AI tools, such as automating repetitive tasks, enhancing code quality, improving website functionality, and optimizing user experiences.&lt;/p&gt;

&lt;p&gt;Moreover, familiarity with AI can create new opportunities for developers, including AI-driven app development and AI model training. Consequently, learning AI has transitioned from being a choice to a necessity for web developers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Tips for Web Developers to Use AI Effectively
&lt;/h2&gt;

&lt;p&gt;As web developers begin their journey into AI, here are some strategies for effectively integrating AI into the web development process:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Utilize AI Assistants: AI assistants can aid developers in various tasks, from debugging code to generating snippets. They enhance the speed and efficiency of software development.&lt;/li&gt;
&lt;li&gt;Incorporate AI in Design: AI can help create dynamic and responsive designs, leading to improved user experience and engagement.&lt;/li&gt;
&lt;li&gt;Employ AI for Testing: AI tools can swiftly identify and resolve bugs in the code, significantly reducing the time required for testing.&lt;/li&gt;
&lt;li&gt;Enhance Personalization with AI: AI can analyze user behavior to deliver personalized experiences, boosting user satisfaction and conversion rates.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Integrating AI into web development does not signal the end of the profession. Instead, it presents an opportunity for developers to refine their skills, increase efficiency, and create more advanced and user-friendly websites.&lt;/p&gt;

&lt;p&gt;AI is simply a tool, and like any other tool, its effectiveness is determined by the user's expertise. Thus, for web developers, understanding and skillfully leveraging AI is essential to remain competitive in this rapidly evolving industry.&lt;/p&gt;

&lt;h2&gt;
  
  
  Will AI Take Over Web Development?
&lt;/h2&gt;

&lt;p&gt;AI is steadily making its way into the field of web development. In the future, we can anticipate a more personalized user experience as AI algorithms become adept at understanding individual behaviors and preferences.&lt;/p&gt;

&lt;p&gt;The entire process of website creation—from design to deployment—could be streamlined with AI-powered website builders and development tools. These tools have the potential to automate much of the web development process, altering the role of developers and making web development more accessible to those without technical expertise. Nonetheless, the human element in creativity and decision-making will continue to be irreplaceable for now...&lt;/p&gt;

</description>
      <category>futureoftech</category>
      <category>webdev</category>
      <category>aiintech</category>
      <category>development</category>
    </item>
    <item>
      <title>AI in Data Analytics: Transforming Decision-Making</title>
      <dc:creator>Remi</dc:creator>
      <pubDate>Fri, 18 Oct 2024 11:03:24 +0000</pubDate>
      <link>https://dev.to/pixiumdigital/ai-in-data-analytics-transforming-decision-making-28h2</link>
      <guid>https://dev.to/pixiumdigital/ai-in-data-analytics-transforming-decision-making-28h2</guid>
      <description>&lt;p&gt;Have you ever considered just how much data is produced on a daily basis? The numbers are staggering—over 2.5 quintillion bytes every day! That’s right. From social media updates to e-commerce transactions, sensor data to digital imagery, the digital world is growing at an exponential rate, overwhelming businesses with an immense flood of information.&lt;/p&gt;

&lt;p&gt;In this age of data explosion, companies face a critical question: How can they tap into this massive wave of information to make smarter, data-driven decisions? While traditional data analytics have been useful, they often fall short in handling the sheer scale, diversity, and speed of data being generated in today's digital environment.&lt;/p&gt;

&lt;p&gt;Enter Artificial Intelligence (AI), a game-changing force that's transforming the field of data analytics.&lt;/p&gt;

&lt;p&gt;In today’s highly competitive and data-centric world, businesses aren’t just overwhelmed by data; they’re actively seeking ways to dive deeper and extract meaningful insights that can drive innovation, streamline processes, and foster strategic growth. Organisations are now investing in AI to enhance their analytics capabilities and secure a competitive advantage in their industries.&lt;/p&gt;

&lt;p&gt;But what exactly does AI bring to the table, and how is it fundamentally changing the way organisations make decisions?&lt;/p&gt;

&lt;p&gt;In this article, we’ll take a deep dive into the world of AI-powered data analytics, uncovering its transformative impact, key advantages, and practical strategies for successful implementation. From revealing hidden insights to forecasting future trends, and from automating mundane tasks to creating personalized user experiences, AI is set to revolutionize decision-making in the digital era. Get ready to explore the exciting convergence of AI and data analytics, where the opportunities are as limitless as the data itself.&lt;/p&gt;

&lt;h1&gt;
  
  
  Understanding The Role of AI in Data Analytics
&lt;/h1&gt;

&lt;p&gt;Understanding AI’s role in data analytics involves a deeper look at how AI techniques enhance and extend traditional data analysis. By introducing advanced algorithms, AI empowers organizations to gain deeper insights, detect hidden patterns, and build predictive models. Here's how AI is reshaping the landscape of data analytics:&lt;/p&gt;

&lt;h2&gt;
  
  
  Task Automation
&lt;/h2&gt;

&lt;p&gt;AI streamlines time-consuming tasks like data cleaning, preprocessing, and transformation. Using machine learning and natural language processing, AI efficiently manages these tasks, allowing data professionals to concentrate on more strategic work.&lt;/p&gt;

&lt;h2&gt;
  
  
  Improved Data Processing
&lt;/h2&gt;

&lt;p&gt;AI excels at processing large volumes of both structured and unstructured data at incredible speeds. Whether analyzing customer transactions, social media interactions, or IoT sensor data, AI can seamlessly handle varied datasets, making it easier for businesses to derive insights from complex data.&lt;/p&gt;

&lt;h2&gt;
  
  
  Pattern Recognition &amp;amp; Prediction
&lt;/h2&gt;

&lt;p&gt;AI, particularly through machine learning, is highly effective at identifying patterns and trends in data. By analyzing historical data, AI can detect correlations, anomalies, and predictive trends, helping businesses anticipate future developments, forecast demand, and make proactive decisions to stay ahead of competitors.&lt;/p&gt;

&lt;h2&gt;
  
  
  Extracting Insights from Unstructured Data
&lt;/h2&gt;

&lt;p&gt;While traditional analytics struggles with unstructured data like text, images, and video, AI-powered technologies such as natural language processing (NLP) and computer vision allow organizations to uncover valuable insights. For instance, sentiment analysis can gauge customer feelings from social media, and image recognition can detect patterns in visual data.&lt;/p&gt;

&lt;h2&gt;
  
  
  Real-time Decision-Making
&lt;/h2&gt;

&lt;p&gt;AI enables real-time analysis and decision-making by processing live data streams. This ability is critical for dynamic industries like finance, manufacturing, and supply chain management, where quick insights can drive operational efficiency and strategic decisions.&lt;/p&gt;

&lt;h2&gt;
  
  
  Personalization &amp;amp; Customer Insights
&lt;/h2&gt;

&lt;p&gt;AI facilitates personalized experiences by analyzing customer data and behaviors. By segmenting audiences, predicting preferences, and tailoring marketing efforts, AI helps organizations enhance customer satisfaction and loyalty.&lt;/p&gt;

&lt;h2&gt;
  
  
  Risk Management &amp;amp; Fraud Detection
&lt;/h2&gt;

&lt;p&gt;AI analytics platforms are skilled at spotting potential risks and identifying anomalies, helping companies detect fraud, monitor cybersecurity, and ensure compliance. AI’s ability to flag unusual patterns provides timely alerts for decision-makers.&lt;/p&gt;

&lt;p&gt;In summary, AI elevates data analytics from being just descriptive or diagnostic to becoming predictive and prescriptive. By embracing AI, businesses can unlock the full potential of their data, driving innovation and gaining a competitive edge in the data-driven world.&lt;/p&gt;

&lt;h1&gt;
  
  
  Benefits of AI in Data Analytics
&lt;/h1&gt;

&lt;p&gt;The advantages of Artificial Intelligence (AI) in data analytics are broad and impactful, touching various facets of data processing, analysis, and decision-making. Here’s a closer look at how AI transforms this field:&lt;/p&gt;

&lt;h2&gt;
  
  
  Greater Accuracy and Precision
&lt;/h2&gt;

&lt;p&gt;AI algorithms can process large datasets with exceptional accuracy. Using advanced statistical models and machine learning, AI identifies subtle patterns, correlations, and anomalies that human analysts might overlook. This heightened precision minimizes errors, ensuring that insights are both reliable and actionable.&lt;/p&gt;

&lt;h2&gt;
  
  
  Accelerated Insights and Real-time Decisions
&lt;/h2&gt;

&lt;p&gt;AI processes data at remarkable speeds, allowing organizations to gain insights and make decisions in real time. Whether analyzing live data from IoT devices, monitoring social media activity, or detecting financial anomalies, AI algorithms handle data streams swiftly, enabling timely and decisive actions.&lt;/p&gt;

&lt;h2&gt;
  
  
  Cost Efficiency and Resource Optimization
&lt;/h2&gt;

&lt;p&gt;By automating repetitive tasks, AI reduces the need for manual intervention, cutting down on time and labor costs. Additionally, AI-driven analytics platforms optimize resource allocation by identifying inefficiencies, streamlining processes, and ensuring optimal use of resources.&lt;/p&gt;

&lt;h2&gt;
  
  
  Smarter Decision-making and Strategic Planning
&lt;/h2&gt;

&lt;p&gt;AI-generated insights equip decision-makers with critical data and recommendations. By analyzing past data, predicting future trends, and simulating various scenarios, AI helps businesses make informed, strategic decisions—whether it’s refining marketing campaigns, optimizing resources, or discovering new business opportunities.&lt;/p&gt;

&lt;h2&gt;
  
  
  Personalized Customer Experiences
&lt;/h2&gt;

&lt;p&gt;AI can analyze customer data to tailor products, services, and marketing based on individual behaviors and preferences. Through segmentation and predictive analytics, AI enables businesses to deliver personalized experiences that drive engagement and customer loyalty.&lt;/p&gt;

&lt;h2&gt;
  
  
  Risk Management and Fraud Detection
&lt;/h2&gt;

&lt;p&gt;AI analytics are effective in identifying risks, detecting fraud, and addressing cybersecurity threats. By recognizing patterns and anomalies, AI can proactively flag potential threats, ensuring compliance and protecting assets in real time.&lt;/p&gt;

&lt;h2&gt;
  
  
  Fostering Innovation and Competitive Edge
&lt;/h2&gt;

&lt;p&gt;AI helps organizations explore new avenues and uncover insights that lead to innovation. By analyzing market trends, customer preferences, and emerging technologies, AI reveals opportunities to develop cutting-edge products, capitalize on untapped markets, and maintain a competitive edge in a fast-paced business environment.&lt;/p&gt;

&lt;p&gt;In essence, AI unlocks the full potential of data analytics, driving efficiency, agility, and innovation. By leveraging these capabilities, organizations can gain actionable insights, make well-informed decisions, and meet their strategic goals in today’s data-driven world.&lt;/p&gt;

&lt;h1&gt;
  
  
  Best Practices of AI in Data Analytics
&lt;/h1&gt;

&lt;p&gt;Successfully implementing AI in data analytics requires adhering to best practices to ensure solutions are effective, reliable, and ethically sound. Here’s a breakdown of key considerations:&lt;/p&gt;

&lt;h2&gt;
  
  
  Data Quality Management
&lt;/h2&gt;

&lt;p&gt;High-quality data is fundamental for AI-driven analytics. Ensure that the data is relevant, accurate, and consistent through processes like data cleansing, normalization, and validation. Implementing strong data governance practices ensures data integrity throughout its lifecycle, from collection to analysis.&lt;/p&gt;

&lt;h2&gt;
  
  
  Interdisciplinary Collaboration
&lt;/h2&gt;

&lt;p&gt;AI solutions benefit from the input of diverse teams, including data scientists, domain experts, business leaders, and IT professionals. Collaboration among these groups ensures AI models address real-world challenges effectively and align with business objectives, enhancing both the design and deployment of AI-powered analytics.&lt;/p&gt;

&lt;h2&gt;
  
  
  Ongoing Learning and Improvement
&lt;/h2&gt;

&lt;p&gt;AI models require continuous refinement to remain effective. Regularly update and optimize algorithms to reflect evolving data patterns and business needs. Continuous education for your team on the latest AI developments ensures they remain capable of maintaining and improving AI systems.&lt;/p&gt;

&lt;h2&gt;
  
  
  Ethics and Transparency
&lt;/h2&gt;

&lt;p&gt;It’s crucial to address ethical concerns such as privacy, fairness, and transparency. Following data privacy regulations and promoting transparency in how AI models operate builds trust. Organizations must also work to eliminate biases within AI algorithms and ensure responsible handling of sensitive information.&lt;/p&gt;

&lt;h2&gt;
  
  
  Culture of Innovation
&lt;/h2&gt;

&lt;p&gt;Encourage experimentation with new AI technologies and techniques to enhance data analytics capabilities. Allocate resources for research and pilot projects to explore emerging trends, novel algorithms, and potential use cases, positioning your organization at the forefront of innovation.&lt;/p&gt;

&lt;h2&gt;
  
  
  Scalability and Integration
&lt;/h2&gt;

&lt;p&gt;Design AI systems with scalability and adaptability in mind. Modular architectures allow for seamless integration with existing data infrastructures and workflows, supporting the expanding data volumes and changing business needs. Scalable AI platforms enable broader deployment across business units.&lt;/p&gt;

&lt;p&gt;By following these best practices, organizations can maximize the impact of AI in data analytics, driving better decisions and staying competitive in a data-driven world.&lt;/p&gt;

&lt;h2&gt;
  
  
  User Training and Adoption
&lt;/h2&gt;

&lt;p&gt;It’s essential to educate users and stakeholders on the capabilities, limitations, and advantages of AI-powered analytics to encourage widespread adoption and maximize its potential. Offering training sessions, workshops, and ongoing learning opportunities helps users become proficient in interpreting AI-driven insights and using AI tools effectively. By incorporating these insights into daily decision-making, organizations can create a more data-driven culture. Engaging users and gathering feedback are key to refining AI solutions and ensuring continuous improvements.&lt;/p&gt;

&lt;p&gt;By embracing these best practices, organizations can fully leverage AI in data analytics while minimizing risks and promoting ethical use. Proper implementation of AI tools can lead to innovation, better decision-making, and measurable business outcomes in today’s data-rich environment.&lt;/p&gt;

&lt;h1&gt;
  
  
  Conclusion
&lt;/h1&gt;

&lt;p&gt;AI has truly transformed the landscape of data analytics, fundamentally changing how organizations make decisions. Its capacity to analyze extensive datasets, uncover complex patterns, and provide real-time actionable insights enables businesses to make informed, data-driven choices with confidence. By implementing AI algorithms, organizations can improve not only the accuracy and efficiency of their data analysis but also their competitiveness and agility in the rapidly changing business environment.&lt;/p&gt;

&lt;p&gt;Nevertheless, as organizations begin their journey into AI-driven analytics, it is crucial to proceed with caution by following best practices and ethical guidelines to effectively manage potential risks. Prioritizing data quality, encouraging interdisciplinary collaboration, and fostering a culture of continuous learning and innovation will allow organizations to maximize the benefits of AI in data analytics while addressing biases and ethical issues.&lt;/p&gt;

&lt;p&gt;At &lt;a href="https://pixiumdigital.com" rel="noopener noreferrer"&gt;Pixium Digital&lt;/a&gt;, we recognize the transformative potential of AI in data analytics, and we are dedicated to helping organizations leverage this power to drive growth and innovation. With our expertise organisations can derive actionable insights, enhance decision-making processes, and gain a competitive advantage in the digital age. If you’re ready to begin your AI-powered analytics journey, partner with Pixium Digital to unlock the full potential of your data.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>development</category>
      <category>dataanalytics</category>
    </item>
    <item>
      <title>How much does a web or mobile application costs in 2021?</title>
      <dc:creator>Remi</dc:creator>
      <pubDate>Wed, 20 Jan 2021 09:37:45 +0000</pubDate>
      <link>https://dev.to/pixiumdigital/how-much-does-a-web-or-mobile-application-costs-in-2021-4ea5</link>
      <guid>https://dev.to/pixiumdigital/how-much-does-a-web-or-mobile-application-costs-in-2021-4ea5</guid>
      <description>&lt;p&gt;The million-dollar question asked by most project owners is: How much does it cost to develop this app? Our answer is: Between 15k USD to 500k USD. You want a car, but we need to know if you want a Ferrari or a Toyota. Putting a price tag on any project can become complicated and is often misunderstood. &lt;/p&gt;

&lt;p&gt;In this article we will try to provide an overview and understanding on how much such may costs, what are the key factors influencing the price, and how to select the right partners for the job.&lt;/p&gt;

&lt;p&gt;Surely, spending a fortune might not guarantee you success, but trying to save money either. You have to find the right balance in order to select a team that you can trust and that will guide you through this journey.&lt;/p&gt;

&lt;h1&gt;
  
  
  App Development - checklist
&lt;/h1&gt;

&lt;p&gt;Here is a typical list of things you need to take into consideration in order to put a price range on any app. This is what your development team (internal or external) will have to cover:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;System architecture and associated scalability&lt;/li&gt;
&lt;li&gt;Database creation and schema.&lt;/li&gt;
&lt;li&gt;Target Medium compatibility &amp;amp; responsiveness (mobile and / or web).&lt;/li&gt;
&lt;li&gt;Target OS compatibility (Android, iOS for mobile).&lt;/li&gt;
&lt;li&gt;Complexity of the logic to implement.&lt;/li&gt;
&lt;li&gt;User experience and design (UX / UI).&lt;/li&gt;
&lt;li&gt;Technology stack to be used.&lt;/li&gt;
&lt;li&gt;Project management.&lt;/li&gt;
&lt;li&gt;Cyber security.&lt;/li&gt;
&lt;li&gt;Data Privacy compliance.&lt;/li&gt;
&lt;li&gt;Quality assurance.&lt;/li&gt;
&lt;li&gt;Development operation to automate the deployment.&lt;/li&gt;
&lt;li&gt;Automatic testing to automate the testing of all the features before deployment.&lt;/li&gt;
&lt;li&gt;Third party API integrations.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These are the minimum elements to be addressed. Some additional modules may be added depending on the platform you are trying to build:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;IoT module (gateway registration &amp;amp; management, data flow from gateway to cloud, data quality &amp;amp; connectivity, data storage, ...)&lt;/li&gt;
&lt;li&gt;Machine Learning for data classification, recommendation system or forecast.&lt;/li&gt;
&lt;li&gt;Hardware / Middleware integration and security &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Realistically to cover the minimum mentioned above an app could take from 250 man hours (for a very simple one) to 10,000 man hours and above (for the most sophisticated and complex ones). Price range can therefore range from a mere 15,000 USD to 600,000+ USD.&lt;/p&gt;

&lt;h1&gt;
  
  
  Development price / hours / region
&lt;/h1&gt;

&lt;p&gt;Before going any further, let's have a look at the average Developers' salary across a few selected countries / sub-continent.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fb8podgneofntklgumny7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fb8podgneofntklgumny7.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.businessofapps.com/app-developers/research/ios-android-developer-salary/" rel="noopener noreferrer"&gt;https://www.businessofapps.com/app-developers/research/ios-android-developer-salary/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Price / hour can range from USD 30 to USD 150 and sometimes even more. Key factors for such price variation are obviously the seniority of the developer, the living costs per country / region and the size of the company you are dealing with. If you work with a large corporate, they will most likely have higher price than if you go with smaller agencies. Smaller agencies tend to be also more flexible and agile over time for you to adjust your platform and cover a better market fit.&lt;/p&gt;

&lt;p&gt;Price per hours in USD per region.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Region&lt;/th&gt;
&lt;th&gt;Min&lt;/th&gt;
&lt;th&gt;Max&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;North America&lt;/td&gt;
&lt;td&gt;120&lt;/td&gt;
&lt;td&gt;180&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Australia&lt;/td&gt;
&lt;td&gt;80&lt;/td&gt;
&lt;td&gt;150&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Europe&lt;/td&gt;
&lt;td&gt;80&lt;/td&gt;
&lt;td&gt;150&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Singapore&lt;/td&gt;
&lt;td&gt;60&lt;/td&gt;
&lt;td&gt;150&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;App development is commonly carried out using one of the 4 following methods, for which you consider the pros and cons.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Independent Freelancer: It might be the most affordable solution, however you will have to manage him/her yourself on a regular basis. If you have limited knowledge of the development process, you will have to rely on his/her judgement. Often those relationships are based on trust. One of the risk is the "One man show" effect. The understanding and development of the system is done by one person. If this person leaves you, all knowledge is lost for your company. You are also limiting your knowledge access range. You leverage on one developer's skills rather than a pool of individual with different expertise.&lt;/li&gt;
&lt;li&gt;Development Company: Often the most cost effective way. They have affordable price, and are agile in their process by not having to go through many management layers to validate a feature or change an order. You will also be able to leverage on the skills of a few engineers (security, dev ops, system infrastructure, technology stack, mobile dev specialist, web dev specialist). Once the scope of the contract is defined, each module is done by the best person up to the task. Knowledge is dispatched across a multitude of individuals, reducing the "One man show" risk. It is also the company's best interest to build a long term and strong relationship with you, so they can scale up as you need.&lt;/li&gt;
&lt;li&gt;Large corporation: Often highly priced. You pay for their reputation, and management layers. Process might be quite tedious, having many stakeholders in the process. They are less subject to accept your changes of orders. Their main advantage might be speed as they are able to pull dozens of developers into 1 project whenever they have too. Having said that 9 women cannot make a baby in 1 month. Lining up 10 times more developers does not necessarily mean your project will be delivered 10 times faster. The more IT engineers working on a project, the higher the overhead is for the code merging and the project management.&lt;/li&gt;
&lt;li&gt;In house team: Some companies hire dedicated in-house team. That implies additional cost for your business, recruitment, management, HR overhead, Bonus, medical insurance, medical leaves, holidays, office space, equipment, up skilling of your employees, etc... In Addition you may have to hire various experts to cover the whole aspects of your project. Once the project is delivered, you end up with a large teams of IT engineers that could become redundant. &lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Project Specification Phase
&lt;/h1&gt;

&lt;p&gt;For the development team to work efficiently, it is crucial to write proper functional &amp;amp; non functional specifications. Various methods and methodologies can be applied such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;UML&lt;/li&gt;
&lt;li&gt;User stories&lt;/li&gt;
&lt;li&gt;Story board&lt;/li&gt;
&lt;li&gt;Design thinking&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The more detailed your specifications are, the more accurate the price estimation will be. Leave no stone unturned. Do not hesitate to share as many information as possible such as your business model as it might imply additional development required to integrate the monetization component. Your provider might even share some expertise with you which could help you fine tune it.&lt;/p&gt;

&lt;p&gt;If you do not have a proper specification document, you should consider contracting your provider to write it for you. From our experienced, this is money well spent. You are most likely to get the solution you want if specifications are clear. Lack of clarity in project definition is one of the top 3 reason for project failure.&lt;/p&gt;

&lt;h1&gt;
  
  
  Features and Functionalities
&lt;/h1&gt;

&lt;p&gt;Let's now have a look at the basic features and functionalities. These are the minimum you will need to develop a basic web or mobile application.&lt;/p&gt;

&lt;p&gt;For the sake of simplification, we have merged together the cost of the Web Server / Web App or Mobile App into 1 table. They are normally estimated separately. The dev unit price has been set at USD 60/hour on the table below.&lt;/p&gt;

&lt;p&gt;Acronyms:&lt;br&gt;
CRUD: Create Review Update Delete&lt;br&gt;
PSP: Payment service provider&lt;br&gt;
UAT: User Acceptance Test&lt;br&gt;
RBAC: Role Based Access Control. Limit access to functionalities based on the user type (ex: Seller vs Buyer)&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Feature&lt;/th&gt;
&lt;th&gt;Min Time (hours)&lt;/th&gt;
&lt;th&gt;Max Time (hours)&lt;/th&gt;
&lt;th&gt;Cost (USD)&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Create the Dev &amp;amp; Live environment with various domain name setup and SSL certificate setup&lt;/td&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;16&lt;/td&gt;
&lt;td&gt;240 - 960&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Development operation setup (Docker / Git / repositories...)&lt;/td&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;16&lt;/td&gt;
&lt;td&gt;240 - 960&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;API development for the mobile app to access the data&lt;/td&gt;
&lt;td&gt;40&lt;/td&gt;
&lt;td&gt;80&lt;/td&gt;
&lt;td&gt;2400 - 4800&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Login stack (login - sign up - reset password - forgot password&lt;/td&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;16&lt;/td&gt;
&lt;td&gt;240 - 960&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;User Management (CRUD User)&lt;/td&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td&gt;24&lt;/td&gt;
&lt;td&gt;480 - 1440&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Payment Integration (Stripe or other PSP&lt;/td&gt;
&lt;td&gt;16&lt;/td&gt;
&lt;td&gt;32&lt;/td&gt;
&lt;td&gt;960 - 1920&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Emailer Integration with about 10 user flow emails&lt;/td&gt;
&lt;td&gt;24&lt;/td&gt;
&lt;td&gt;32&lt;/td&gt;
&lt;td&gt;1440 - 1920&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Notification System&lt;/td&gt;
&lt;td&gt;24&lt;/td&gt;
&lt;td&gt;32&lt;/td&gt;
&lt;td&gt;1440 - 1920&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Basic functionality to exchange messages&lt;/td&gt;
&lt;td&gt;20&lt;/td&gt;
&lt;td&gt;40&lt;/td&gt;
&lt;td&gt;1200 - 2400&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Multi Language&lt;/td&gt;
&lt;td&gt;16&lt;/td&gt;
&lt;td&gt;32&lt;/td&gt;
&lt;td&gt;960 - 1920&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Cron Jobs (background tasks such as reminders)&lt;/td&gt;
&lt;td&gt;16&lt;/td&gt;
&lt;td&gt;32&lt;/td&gt;
&lt;td&gt;960 - 1920&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;System Security (architecture)&lt;/td&gt;
&lt;td&gt;16&lt;/td&gt;
&lt;td&gt;32&lt;/td&gt;
&lt;td&gt;960 - 1920&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;RBAC&lt;/td&gt;
&lt;td&gt;16&lt;/td&gt;
&lt;td&gt;32&lt;/td&gt;
&lt;td&gt;960 - 1920&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Data Privacy Policies / encryption&lt;/td&gt;
&lt;td&gt;24&lt;/td&gt;
&lt;td&gt;48&lt;/td&gt;
&lt;td&gt;1440 - 2880&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Final Design Integration&lt;/td&gt;
&lt;td&gt;24&lt;/td&gt;
&lt;td&gt;48&lt;/td&gt;
&lt;td&gt;1440 - 2880&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Testing and UAT&lt;/td&gt;
&lt;td&gt;16&lt;/td&gt;
&lt;td&gt;32&lt;/td&gt;
&lt;td&gt;960 - 1920&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Final Deployment&lt;/td&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td&gt;240 - 480&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;TOTAL&lt;/td&gt;
&lt;td&gt;280&lt;/td&gt;
&lt;td&gt;560&lt;/td&gt;
&lt;td&gt;16,800 - 33,600&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;As per the example above, the price range can go from 17,000 USD to 34,000 USD for a very basic mobile application to exchange messages between users. &lt;/p&gt;

&lt;h1&gt;
  
  
  How much did famous apps costs ?
&lt;/h1&gt;

&lt;p&gt;Now let's take a quick look at the estimated numbers of hours required to build the first version of some famous app that we all use, and then estimate their costs.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2F31zmms247gt9dh1rb3oi.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2F31zmms247gt9dh1rb3oi.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Price: 60 USD / hour&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;App&lt;/th&gt;
&lt;th&gt;Hours&lt;/th&gt;
&lt;th&gt;Price&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Tinder&lt;/td&gt;
&lt;td&gt;1500&lt;/td&gt;
&lt;td&gt;90,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Netflix&lt;/td&gt;
&lt;td&gt;800&lt;/td&gt;
&lt;td&gt;48,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Asos&lt;/td&gt;
&lt;td&gt;1,200&lt;/td&gt;
&lt;td&gt;72,000&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;As you can see, a Tinder like app that did not use to have a lot of functionalities could easily cost 90k USD. On top of the front-end features, you also have to think about the data processing, matching system, recommendation engine and data storage which could increase your development price.&lt;/p&gt;

&lt;h1&gt;
  
  
  Great ! My App is live. What now?
&lt;/h1&gt;

&lt;p&gt;Once your app is released, let's discuss support. It is always highly recommended to go with a maintenance contract. It can be pre-paid hours, pay per use or fully dedicated resources that you can use to maintain and upgrade your system. As your user base grows, issues might arise, server monitoring and patches installation will become necessary. Your system is a living one. It will behave and react when users are using it so it is a good idea to have a team ready to act when things are happening.&lt;/p&gt;

&lt;p&gt;The industry standard is to spend about 10-15% of your development budget in maintenance per annum. Additional funding might be allocated if you need to add features.&lt;/p&gt;

&lt;p&gt;But do not over-engineer it. Better to release an MVP (Minimum Viable Product) and develop it further through iterations rather than building something over overly complex from the start. Too many functionalities create confusion for a newly launched product or service. Be ready to A/B test your features and learn from your customers feedbacks.&lt;/p&gt;




&lt;h1&gt;
  
  
  About Us
&lt;/h1&gt;

&lt;p&gt;Pixium Digital Pte Ltd is an agile software development company with their headquarters located in Singapore. We focus on shaping our clients project from ideas to successful project launch.&lt;/p&gt;

</description>
      <category>programming</category>
      <category>mobile</category>
      <category>webdev</category>
      <category>devops</category>
    </item>
    <item>
      <title>Cyber Security Introduction (part 5: Bruteforce)</title>
      <dc:creator>Remi</dc:creator>
      <pubDate>Fri, 08 Jan 2021 02:19:16 +0000</pubDate>
      <link>https://dev.to/pixiumdigital/cyber-security-introduction-part-5-bruteforce-28f2</link>
      <guid>https://dev.to/pixiumdigital/cyber-security-introduction-part-5-bruteforce-28f2</guid>
      <description>&lt;p&gt;Fifth post of the Cyber Security Introduction series. Let's talk about &lt;strong&gt;Bruteforce&lt;/strong&gt; attacks. Looking at how it happens, how you can prevent it and the impact it can have on businesses.&lt;/p&gt;

&lt;h1&gt;
  
  
  What is a Bruteforce attack?
&lt;/h1&gt;

&lt;p&gt;A Bruteforce attack is when a perpetrator will test many username and / or password combinations to gain access to a system. A good analogy would be trying out every combination on a four digit padlock with the exception that a computer can do it much faster.&lt;/p&gt;

&lt;p&gt;This kind of attack can be used to gain access to various services.&lt;/p&gt;

&lt;p&gt;For example:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Modem / Router configurations&lt;/li&gt;
&lt;li&gt;WiFi Networks&lt;/li&gt;
&lt;li&gt;Decrypt passwords of encrypted storage&lt;/li&gt;
&lt;li&gt;Protocol logins (FTP, MySQL, SMTP, Telnet)&lt;/li&gt;
&lt;li&gt;User accounts (online storage, emails, banking)&lt;/li&gt;
&lt;li&gt;IOT Devices&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Faxe9vjkxrcq6d2shrblf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Faxe9vjkxrcq6d2shrblf.png" alt="Password Art"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Let's take a look at the various types of Bruteforce attacks:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Simple Bruteforce Attack&lt;/strong&gt; - This will use no logic and just try every possible combinations.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Hybrid Bruteforce Attack&lt;/strong&gt; - This will use basic logic to figure out what combinations to use. For example trying all combinations longer than 5 characters and containing at least one number.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Dictionary Bruteforce Attack&lt;/strong&gt; - The attack will try combinations coming from a list. Usually this would be a list of the most common usernames and passwords.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Rainbow Bruteforce Attack&lt;/strong&gt; - This attack uses rainbow tables which are a list of pre-computed hash results and reducing functions. This helps determine various possibilities for passwords  when a hash is accessible. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Reverse Bruteforce Attack&lt;/strong&gt; - This attack is based on knowing a parameter and trying to find a match. This will usually be used when the username is known.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Credential Recycling&lt;/strong&gt; - Here an attacker would use already available credentials (from past data breach, hacks, etc.) to see if they will authenticate the user successfully.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  How to prevent it?
&lt;/h1&gt;

&lt;h2&gt;
  
  
  As an Individual
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Don't use personal information&lt;/strong&gt; - It can be tempting to use names of family members, animals or birthdays as it makes passwords easier to remember. But keep in mind that this information is very easy to find through Social Engineering or online searches.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Make your password original&lt;/strong&gt; - Try to use variance and include  letters, numbers and symbols. This forces attackers to try numerous combinations which can be very time consuming.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Example below of the time required to Bruteforce a password depending on complexity.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.redd.it%2Fnpq7p60b1lj51.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.redd.it%2Fnpq7p60b1lj51.jpg" alt="bruteforce chart"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Don't re-use passwords&lt;/strong&gt; - Try to never use the same password as if it is leaked once then all your accounts are compromised. This can be very dangerous especially if your e-mail account gets compromised as it is used in most password recoveries. You can look into using password managers to help you manage all variations. You can try to check if your email has appeared in past breaches here: &lt;a href="https://haveibeenpwned.com/" rel="noopener noreferrer"&gt;https://haveibeenpwned.com/&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Use Multi Factor Authentication (MFA)&lt;/strong&gt; - Most big services have implemented the MFA principle. This means if there is an irregular login you will be required to authorize it through an alternative system (usually SMS).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Don't use common passwords&lt;/strong&gt; - Passwords that are in the most used password list should never be used. This list can be found here: &lt;a href="https://nordpass.com/most-common-passwords-list/" rel="noopener noreferrer"&gt;https://nordpass.com/most-common-passwords-list/&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  As a Developer / Administrator
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Encrypt Data and Hash Passwords&lt;/strong&gt; - Important user data in database should be encrypted and passwords should always be hashed! Here are the recommender algorithms by &lt;a href="https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html" rel="noopener noreferrer"&gt;OWASP&lt;/a&gt;: Argon2id, PBKDF2, Bcrypt.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Implement 2FA or MFA&lt;/strong&gt; - Whenever possible enable / implement two-factor authentication or multi-factor authentication. You can then force this to be triggered when there has been one failed password usage for the account. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Account Lockout&lt;/strong&gt; - Consider blocking access to accounts after a certain number of failed connection attempts. The user would then  have to access an email to unlock the account.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Captcha&lt;/strong&gt; - Yes the devil is here! But you don't have to have the captcha active all the time you can require it after X failed attempts to mitigate any Bruteforce attacks.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Geo-loc&lt;/strong&gt; - It is good to track the location (IP lookup) of your users. If you detect someone trying to login from another country you can then require 2FA or MFA to kick in to make sure it is the owner connecting. This could also trigger a lock out protocol as seen above.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Change default passwords&lt;/strong&gt; - Many services come with root accounts that have a default password (admin:admin, mysql:root, etc.). These passwords should &lt;strong&gt;ALWAYS&lt;/strong&gt; be changed.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Check on compromised users&lt;/strong&gt; - You may want to look at APIs like &lt;a href="https://haveibeenpwned.com/" rel="noopener noreferrer"&gt;Have I Been Pwned&lt;/a&gt;, &lt;a href="https://breachalarm.com/" rel="noopener noreferrer"&gt;Breach Alarm&lt;/a&gt;, &lt;a href="https://www.dehashed.com/" rel="noopener noreferrer"&gt;DeHashed&lt;/a&gt; to see if your users or employees appear in new breaches and force them to update their passwords.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Impact of Bruteforce Attacks?
&lt;/h1&gt;

&lt;p&gt;Depending on the type of account that is successfully accessed a breach via Bruteforce Attack can be devastating. For instance if the root account of a MySQL service is hijacked this can lead to database dumps and modifications.&lt;/p&gt;

&lt;p&gt;In some cases such as IOT the device could be hijacked and then used as part of a Botnet. Through the course of 2020 the infection of IOT devices has grown by &lt;a href="https://threatpost.com/iot-device-takeovers-surge/160504/" rel="noopener noreferrer"&gt;more than 100%&lt;/a&gt;. A lot of these attacks are successful due to unchanged default credentials. &lt;/p&gt;

&lt;p&gt;As Bruteforce attacks in some cases require the trial of millions on combinations, it may lead to a unintentional &lt;a href="https://dev.to/pixiumdigital/cyber-security-introduction-part-4-denial-of-service-ike"&gt;Denial of Service or Distributed Denial of Service attacks&lt;/a&gt; which could also harm your services.&lt;/p&gt;




&lt;h1&gt;
  
  
  About Us
&lt;/h1&gt;

&lt;p&gt;Pixium Digital is an agile software development company with their headquarters located in Singapore. We focus on shaping our clients project from ideas to successful project launch.&lt;/p&gt;

&lt;p&gt;Cyber Security is a big part of any project we have to deliver. Very often we have been the witness of lack of awareness or caution from various providers or clients we have worked with. We aim to share those little tips to the community so that with everyone's effort, we can make the web a safer place.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
      <category>beginners</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>Cyber Security Introduction (part 4: Denial Of Service)</title>
      <dc:creator>Remi</dc:creator>
      <pubDate>Thu, 31 Dec 2020 06:50:30 +0000</pubDate>
      <link>https://dev.to/pixiumdigital/cyber-security-introduction-part-4-denial-of-service-ike</link>
      <guid>https://dev.to/pixiumdigital/cyber-security-introduction-part-4-denial-of-service-ike</guid>
      <description>&lt;p&gt;Fourth post of the Cyber Security Introduction series. Let's talk about the &lt;strong&gt;Denial of Service&lt;/strong&gt; and &lt;strong&gt;Distributed Denial of Service&lt;/strong&gt; attacks. Looking at how it happens, how you can prevent it and how you can recover from it when possible.&lt;/p&gt;

&lt;h1&gt;
  
  
  What is DoS / DDoS?
&lt;/h1&gt;

&lt;p&gt;A DoS is an attack whose goal is to render the target (machine, network, etc.) inaccessible. This is done either through flooding traffic or through a tailored payload that will cause the machine to crash. &lt;/p&gt;

&lt;p&gt;In a DoS attack the point of origin will be one machine.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fzv9m0zuem65dgn934in5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fzv9m0zuem65dgn934in5.png" alt="DoS Attack"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;With a DDoS on the other hand the attack originates from multiple sources. This is usually more powerful and destructive.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fe445ki6sfpoy1d4q6943.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fe445ki6sfpoy1d4q6943.png" alt="DDoS Attack"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;These attacks may be used as a way to ransom an entity by requiring a payment to stop the services from being unusable. The goal can be to force secondary and backup services to kick in, which themselves may be vulnerable to other types of attacks.&lt;/p&gt;

&lt;p&gt;Below are the most common types of Dos / DDoS attacks:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;TCP CONNECTION ATTACKS&lt;/strong&gt;&lt;br&gt;
This type of attack if often used through SYN Flood. The target receives a SYN packet to start a three way handshake and sends a reply. The attacker however does not reply which leaves the connection hanging and proceeds to repeat the following process.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;APPLICATION LAYER ATTACKS&lt;/strong&gt;&lt;br&gt;
This attack is usually slower than the precedent as it targets issues directly in the application. These tend to be harder to detect as they do not necessarily surge the traffic. They are often used in conjunction with TCP CONNECTION attacks.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;FRAGMENTATION ATTACKS&lt;/strong&gt;&lt;br&gt;
Here the attacker will look into splitting the traffic into multiple packets that are then reassembled on the victim's network. However the packets contain falsified payloads that break the reassembly process and thus overloads the server.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;VOLUMETRIC ATTACKS&lt;/strong&gt;&lt;br&gt;
This is the most common type of attack where a network of bots controlled by a perpetrator will be used to send numerous request to one target specifically causing the network or server to be overwhelmed. The more bots the more powerful the attack.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  How to prevent it?
&lt;/h1&gt;

&lt;h2&gt;
  
  
  Pre-Attack
&lt;/h2&gt;

&lt;p&gt;Configure &lt;strong&gt;routers&lt;/strong&gt; and &lt;strong&gt;firewalls&lt;/strong&gt; to reject fake traffic. It is also important to make sure they are up to date with the latest patches.&lt;/p&gt;

&lt;p&gt;Check that all devices are secured with antivirus, launch regular security scans and update software and firmware. Also make sure you change default passwords on IOT devices as they are the common  source for bots.&lt;/p&gt;

&lt;p&gt;Make sure you have extra &lt;strong&gt;network bandwidth&lt;/strong&gt; as well as &lt;strong&gt;network redundancy&lt;/strong&gt;. This will help mitigate surges in traffic at the beginning of DDoS attacks until active measures kick-in.&lt;/p&gt;

&lt;p&gt;Use an anti-ddos service like Cloudflare or Advanced Amazon Shield they will help you identify and block non-legitimate traffic.&lt;/p&gt;

&lt;h2&gt;
  
  
  During Attacks
&lt;/h2&gt;

&lt;p&gt;Contact you Internet Service Provider (ISP) as fast as possible as they might be able to re-route traffic into a &lt;strong&gt;null route&lt;/strong&gt; where the fake traffic will get lost.&lt;/p&gt;

&lt;p&gt;If your business is critical you can look into having a backup ISP to let you switch over in case of a DoS or DDoS attack.&lt;/p&gt;

&lt;h1&gt;
  
  
  Impact and how to recover from it?
&lt;/h1&gt;

&lt;p&gt;The critical part to recovering from a DoS / DDoS attack is to analyze the details of the attack. Here are a key points to look at:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Which assets were attacked?&lt;/strong&gt;&lt;br&gt;
This will help you identify the goal of the attackers and the weakest point in the infrastructure.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;What were the attack characteristics?&lt;/strong&gt;&lt;br&gt;
Was it a DoS or a DDoS? Was it using complex multi level attacks? &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Is you application recovery ready?&lt;/strong&gt;&lt;br&gt;
Keep in mind that if a DoS / DDoS renders your services offline then all the users that have been denied access will try to re-access it as soon as it is back online. Are your services ready to handle large traffic?&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This information will help you identify the areas in your infrastructure that needs a security review to be able to handle and mitigate DoS / DDoS.&lt;/p&gt;

&lt;p&gt;Depending on your business nature you may disclose the attack to either clients or users of the platform. In some country, a police report might be compulsory.&lt;/p&gt;

&lt;h1&gt;
  
  
  Live DoS / DDoS Map
&lt;/h1&gt;

&lt;p&gt;Have a look at live information on DoS and DDoS major attacks!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.digitalattackmap.com/#anim=1&amp;amp;color=0&amp;amp;country=ALL&amp;amp;list=0&amp;amp;time=18625&amp;amp;view=map" rel="noopener noreferrer"&gt;https://www.digitalattackmap.com/#anim=1&amp;amp;color=0&amp;amp;country=ALL&amp;amp;list=0&amp;amp;time=18625&amp;amp;view=map&lt;/a&gt;&lt;/p&gt;




&lt;h1&gt;
  
  
  About Us
&lt;/h1&gt;

&lt;p&gt;Pixium Digital is an agile software development company with their headquarters located in Singapore. We focus on shaping our clients project from ideas to successful project launch.&lt;/p&gt;

&lt;p&gt;Cyber Security is a big part of any project we have to deliver. Very often we have been the witness of lack of awareness or caution from various providers or clients we have worked with. We aim to share those little tips to the community so that with everyone's effort, we can make the web a safer place.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
      <category>beginners</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>Cyber Security Introduction (part 3: Man in the Middle )</title>
      <dc:creator>Remi</dc:creator>
      <pubDate>Thu, 24 Dec 2020 05:53:30 +0000</pubDate>
      <link>https://dev.to/pixiumdigital/cyber-security-introduction-part-3-man-in-the-middle-3od1</link>
      <guid>https://dev.to/pixiumdigital/cyber-security-introduction-part-3-man-in-the-middle-3od1</guid>
      <description>&lt;p&gt;Third post of the Cyber Security Introduction series. Let's talk about the Man in the Middle attack, how it happens, how you can prevent it and how to can recover from it when possible.&lt;/p&gt;

&lt;h1&gt;
  
  
  What is Man in the Middle?
&lt;/h1&gt;

&lt;p&gt;For a Man-in-the-middle (MITM) attack to take place you need three actors: the victim, an entity the victim is trying to communicate with, the &lt;code&gt;man in the middle&lt;/code&gt; which intercepts the communication.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fpsxn4fok12g9lven9210.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fpsxn4fok12g9lven9210.gif" alt="MITM Example"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;MITM attacks are a tactical means to an end. The outcome could be spying on a target (individual, groups, companies), redirecting traffic, stealing credentials / sessions and more.&lt;/p&gt;

&lt;h1&gt;
  
  
  How to prevent it?
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Make sure that any website you visit uses the &lt;code&gt;HTTPS&lt;/code&gt; protocol and that the certificate is valid. This will often be represented by a closed lock in the address bar.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fpv9g2za23hhpsx8h9k3u.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fpv9g2za23hhpsx8h9k3u.png" alt="ssl lock"&gt;&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt; Try not to connect to public Wi-Fi like Starbucks, Airports, etc. Instead use a Mobile Hotspot and connect directly to your phone as this is a lot harder to spoof. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;If you need to connect to a public Wi-Fi make sure that you use a Virtual Private Network (VPN) that encrypts the data as this will limit the MITM possibilities.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Make sure that your home Wi-Fi network is secured. This can be done by using the latest Wi-Fi security (WPA2 or WPA3). Make sure your home router is up to date with the latest firmware. Change the default Wi-Fi password and default router login to something complex.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Regularly check the connected devices on your network and kick out any unknown or old devices. This can be done from your router management page. Also check for hard-wired connected devices; there have been cases of attackers plugging small devices that siphons and records all communications on a network (example below of a device hidden in plain sight).&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fiayuyl98qibxlywd9fi8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fiayuyl98qibxlywd9fi8.png" alt="hardware in plain sight"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Finally whenever possible make sure that you have Multi Factor Authentication (MFA) activated. If your login information are stolen  and MFA is activated you will be notified of any login attempts.&lt;/p&gt;

&lt;h1&gt;
  
  
  Impact and how to recover from it?
&lt;/h1&gt;

&lt;p&gt;MITM attacks can be devastating as they let attackers access many types of data such as: logins and passwords, visited websites, session tokens and cookies, personal information and more. &lt;/p&gt;

&lt;p&gt;From the moment you discover that you have been a victim of a MITM attack you should deem all data compromised. From this point you will need to connect to a secure network and rotate all passwords, keys and any confidential information.&lt;/p&gt;

&lt;p&gt;You will then have to identify where the attack took place and which network was compromised and why. This is typically where the police might be involved and other cyber-security agencies working with the police.&lt;/p&gt;

&lt;p&gt;In conclusion always be wary of where you connect to. also keep in mind to regularly check for anomalies in your network.&lt;/p&gt;




&lt;h1&gt;
  
  
  About Us
&lt;/h1&gt;

&lt;p&gt;Pixium Digital is an agile software development company with their headquarters located in Singapore. We focus on shaping our clients project from ideas to successful project launch.&lt;/p&gt;

&lt;p&gt;Cyber Security is a big part of any project we have to deliver. Very often we have been the witness of lack of awareness or caution from various providers or clients we have worked with. We aim to share those little tips to the community so that with everyone's effort, we can make the web a safer place.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>maninthemiddle</category>
      <category>devops</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>Cyber Security Introduction (part 2: Phishing)</title>
      <dc:creator>Remi</dc:creator>
      <pubDate>Fri, 11 Dec 2020 09:23:02 +0000</pubDate>
      <link>https://dev.to/pixiumdigital/cyber-security-introduction-part-2-phishing-5g7</link>
      <guid>https://dev.to/pixiumdigital/cyber-security-introduction-part-2-phishing-5g7</guid>
      <description>&lt;p&gt;Second post of the Cyber Security Introduction series. In this article we will talk about one of the most common and simple cyber attack; Phishing, how it happens, how to prevent it and how to recover from it.&lt;/p&gt;

&lt;p&gt;32% of confirmed data breaches involve phishing. So what is this exactly?&lt;/p&gt;




&lt;h1&gt;
  
  
  What is Phishing?
&lt;/h1&gt;

&lt;p&gt;Phishing is the simple practice of sending fraudulent communications that appear to come from a reputable source. It is usually performed through email. The goal is to steal sensitive data like credit card, login information or to install malware on the victim's machine.&lt;/p&gt;

&lt;p&gt;Here is a flow example of a email phishing attack:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;You receive a fake branded email.&lt;/li&gt;
&lt;li&gt;Email has fake branded link (ex: &lt;code&gt;facebok.com&lt;/code&gt; with one 'o').&lt;/li&gt;
&lt;li&gt;You click and land on a falsified branded page.&lt;/li&gt;
&lt;li&gt;Page asks you to login, change your password or provide other information.&lt;/li&gt;
&lt;li&gt;Hackers capture your data and automatically redirect you to the official (real) website.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;You have been hacked and you don't even know it.&lt;/strong&gt; If you use the same authentication across various platform, you are fully exposed.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://i.giphy.com/media/kIRVh493Re9o4WDlf9/giphy.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://i.giphy.com/media/kIRVh493Re9o4WDlf9/giphy.gif" alt="Phishing Gif"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h1&gt;
  
  
  How to prevent it?
&lt;/h1&gt;

&lt;p&gt;Here are a few tips and best practices you can apply in order to reduce the chances of phishing. Remember that &lt;strong&gt;90% of attacks&lt;/strong&gt; come from human errors; The more careful and aware you are, the easiest to prevent it.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Check the email and domain name of the sender.&lt;/li&gt;
&lt;li&gt;Check that it is not a generic email.&lt;/li&gt;
&lt;li&gt;Don't give any personal information via email.&lt;/li&gt;
&lt;li&gt;If there are links in the email, check the security of the website URL (https, little lock on the left).&lt;/li&gt;
&lt;li&gt;Do not use phone numbers present in emails and use the one present on the official website.&lt;/li&gt;
&lt;li&gt;Pay attention to details, phishing emails often have typos.&lt;/li&gt;
&lt;li&gt;If you have any doubts, contact you tech support who might be able to advice you.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fnrefnvs5c0upew59czt7.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fnrefnvs5c0upew59czt7.jpeg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h1&gt;
  
  
  Alternative: Voice Phishing
&lt;/h1&gt;

&lt;p&gt;A voice phishing is similar to the previous one. The only difference is that the perpetrator will impersonate a company, or institution over the phone.&lt;/p&gt;

&lt;p&gt;Example:&lt;br&gt;
You receive a call from your Internet Provider.&lt;br&gt;
They explain that they noticed strange activity over your network and that they will help you resolve it.&lt;br&gt;
They ask you to open your laptop and run a few actions. They will often start with simple.&lt;br&gt;
Once they got your trusts they will ask you to execute more complex ones that will for instance:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Open a backdoor to give the attacker access to the computer&lt;/li&gt;
&lt;li&gt;Encrypt all your files and blackmail you to decrypt them &lt;/li&gt;
&lt;li&gt;Download malware to your computer&lt;/li&gt;
&lt;li&gt;Steal sensitive or personal information&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;How to prevent it?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Always ask for the identity of the person who calls you.&lt;br&gt;
Never run or do anything on your computer that you do not know or fully understand.&lt;/p&gt;




&lt;h1&gt;
  
  
  Example of Phishing Campaign
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.phishing.org%2Fhs-fs%2Fhubfs%2Fms_tech-support-scam.png%3Ft%3D1490303051874%26width%3D640%26name%3Dms_tech-support-scam.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.phishing.org%2Fhs-fs%2Fhubfs%2Fms_tech-support-scam.png%3Ft%3D1490303051874%26width%3D640%26name%3Dms_tech-support-scam.png" alt="Phishing Example"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Let's take a look at the above image and how we can recognize it is a phishing attempt.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Looking at the sender email we already see something out of the ordinary.&lt;br&gt;
The sender email is: &lt;code&gt;no-reply_msteam2@outlook.com&lt;/code&gt;&lt;br&gt;
As much as the &lt;code&gt;outlook.com&lt;/code&gt; is real the first part &lt;code&gt;no-reply_msteam2&lt;/code&gt; clearly shows that this was a registered email. Most official emails come from simple addresses such as &lt;code&gt;support@outlook.com&lt;/code&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The title of the email is very generic &lt;code&gt;Windows Error Report&lt;/code&gt;. Most sign-in attempt will usually have email title such as &lt;code&gt;We have detected unusual activity on your account&lt;/code&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The email head is also very generic &lt;code&gt;Windows User Alert&lt;/code&gt; any big company will always be able to identify you either through your username, name or even email. For example &lt;code&gt;Hello Mr.Doe&lt;/code&gt; or &lt;code&gt;Hey @cool_username&lt;/code&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Language! Just looking at the first sentence we can see some language and sentence structure issues &lt;code&gt;We detected something unusual to use an application to sign in to your Windows Computer&lt;/code&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The email also contains nonsensical logic. This might be hard to spot by non-tech people. If you have any doubt about an email it is best to ask your tech support. The whole idea that Microsoft has officers looking at a sign-in attempt from every user is not feasible. The whole sentence &lt;code&gt;a prohibited connection on your network which can corrupt your windows license key&lt;/code&gt; also doesn't mean much in IT terms.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;In the email there is also a fake phone number. Looking at the official Microsoft support page we can see that there are no numbers similar to the one in the email: &lt;a href="https://support.microsoft.com/en-us/help/4051701/global-customer-service-phone-numbers" rel="noopener noreferrer"&gt;https://support.microsoft.com/en-us/help/4051701/global-customer-service-phone-numbers&lt;/a&gt;&lt;br&gt;
This is why it is important to go through the official support channels if you get an email asking you to contact the support team. &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;**This email is classified as a typical phishing attack. If services or companies require you to update some personal information about your account it is always best practice to go through the official website. Any issues with your account will be flagged in your personal dashboard.&lt;/p&gt;




&lt;h1&gt;
  
  
  About Us
&lt;/h1&gt;

&lt;p&gt;Pixium Digital is an agile software development company with their headquarters located in Singapore. We focus on shaping our clients project from ideas to successful project launch.&lt;/p&gt;

&lt;p&gt;Cyber Security is a big part of any project we have to deliver. Very often we have been the witness of lack of awareness or caution from various providers or clients we have worked with. We aim to share those little tips to the community so that with everyone's effort, we can make the web a safer place.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>cyberattacks</category>
      <category>devops</category>
      <category>security</category>
    </item>
    <item>
      <title>Cyber Security Introduction (part 1)</title>
      <dc:creator>Remi</dc:creator>
      <pubDate>Wed, 09 Dec 2020 09:07:03 +0000</pubDate>
      <link>https://dev.to/pixiumdigital/cyber-security-introduction-part-1-ok5</link>
      <guid>https://dev.to/pixiumdigital/cyber-security-introduction-part-1-ok5</guid>
      <description>&lt;h1&gt;
  
  
  Introduction
&lt;/h1&gt;

&lt;p&gt;Cyber-Security is a hot topic. Because of COVID-19, there has been a shift to work-from home policies. This had led to a drastic increase of cyber attacks over the past few months.&lt;/p&gt;

&lt;p&gt;KEY NUMBERS:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;On average a cyber attack happens every 39 seconds.&lt;/li&gt;
&lt;li&gt;90% of cyber security breaches are due to human errors as opposed to technical mis-configurations or lack of technical security tools setup up by companies.&lt;/li&gt;
&lt;li&gt;77% of organizations do not have cyber security incident response plan. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It is one thing to be hacked, but it is another thing to be able to respond promptly in order to mitigate the action, or activate your recovery plan.&lt;/p&gt;

&lt;p&gt;This series of articles aims to briefly introduce cyber security, but also provide general knowledge and advises on what each individuals can do to prevent such event from happening.&lt;/p&gt;

&lt;h1&gt;
  
  
  Attacks? But Who, Why and How?
&lt;/h1&gt;

&lt;h3&gt;
  
  
  Who
&lt;/h3&gt;

&lt;p&gt;When an attack occurs it can target different entities depending on the various objectives.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Ffjvoyzh2zogq9owf6t76.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Ffjvoyzh2zogq9owf6t76.png" alt="Potential Cyber Attack Targets"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;A &lt;strong&gt;specific person&lt;/strong&gt; can be the primary target of an attack. In that case the attacker might have a grudge against that specific person or might need something in possession of that person (access). In this case the hackers know who he wants to hack.&lt;/p&gt;

&lt;p&gt;The target of an attack can also be a &lt;strong&gt;company&lt;/strong&gt;. In this case, the hackers could be trying to do corporate espionage or simply get revenge against it.&lt;/p&gt;

&lt;p&gt;A &lt;strong&gt;filtered list&lt;/strong&gt; could also be the main focus for an attack. This would include target groups like an email list of gamers or a leaked list of logins and password from a specific website.&lt;/p&gt;

&lt;p&gt;There are cases where a &lt;strong&gt;global accessible malware&lt;/strong&gt; is used. For example a mass phishing attack could be executed using a website that is publicly available for everyone. Attackers will wait for users to fall into the trap and will sometimes even use classic advertising techniques.&lt;/p&gt;

&lt;p&gt;Finally, you could be hacked as part of collateral damage. In the event of that one of your connection's email is hacked, any information you exchanged with this person will now be available to the hacker. This is why it is always important to never share authentication (email &amp;amp; password, encryption key, etc.) via email, as you will be exposing yourself. &lt;/p&gt;

&lt;h3&gt;
  
  
  Why
&lt;/h3&gt;

&lt;p&gt;Let's take a look at the main reasons Hackers would attacks a website or system:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Money (ransom-ware, blackmail).&lt;/li&gt;
&lt;li&gt;Information theft (identity theft, corporate espionage).&lt;/li&gt;
&lt;li&gt;Disrupt services.&lt;/li&gt;
&lt;li&gt;Fun (make a point, contest or simply because the are bored).&lt;/li&gt;
&lt;li&gt;Driven by a cause (anonymous, hacktivism, terrorism).&lt;/li&gt;
&lt;li&gt;Or simply because they just can, so why not ?! :)&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  How: Most common attacks
&lt;/h3&gt;

&lt;p&gt;We will now take a look at the most common types of attacks regardless of the platform or system targeted.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Phishing&lt;br&gt;
It is used to impersonate an entity usually this comes under the shape of emails, websites. An attacker will send a well crafted email asking you to follow a specific link or to send a password. In terms of websites the attacker might use a website that looks exactly like a real facebook or google sign-in to try and steal credentials.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Man in the middle&lt;br&gt;
In this type of attack the perpetrator will be sitting in between a client and a server and syphoning or analyzing all the traffic going through to see unencrypted content or hijack sessions. This is often used in public places such as starbucks, macdonald where traffic is not encrypted.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Denial Of Services (DoS / DDoS)&lt;br&gt;
A Denial of Service (DoS) is usually when you spam packets on a certain protocol with the goal of overloading the service. Distributed Denial of Service (DDOS) refers to a DoS but instead of coming from one source it comes from multiple sources.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;SQL Injection&lt;br&gt;
Here an attacker will try to either directly inject, extract, delete, modify, data from the database through modifying forms, queries, requests.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Brute Force&lt;br&gt;
This is the act of trying to authenticate, identify using a high number of combinations. It might be from spaming number sequences to bypass an One Time Password (OTP) or using a list of common usernames and passwords to try and access a service.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Next Articles
&lt;/h1&gt;

&lt;p&gt;If the next articles we will be tackling each of the most common attacks previously mentioned and provide quick tips for you to be more careful and prepared. &lt;/p&gt;

&lt;h1&gt;
  
  
  About Us
&lt;/h1&gt;

&lt;p&gt;Pixium Digital is an agile software development company with their headquarters located in Singapore. We focus on shaping our clients project from ideas to successful project launch. &lt;/p&gt;

&lt;p&gt;Cyber Security is a big part of any project we have to deliver. Very often we have been the witness of lack of awareness or caution from various providers or clients we have worked with. We aim to share those little tips to the community so that with everyone's effort, we can make the web a safer place.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>cyberattacks</category>
      <category>security</category>
      <category>devops</category>
    </item>
  </channel>
</rss>
