Journal

LastPass Data Breach: Source code stolen
LastPass is a password manager that allows you to store all of your passwords in one place, so you don’t

Malware Attack – Common ways an Android phone can get infected.
What is Malware? Malware is short for “malicious software.” It’s a general term that refers to any type of software

What is Metadata? How can it be useful in Cyber Forensics?
Introduction: What is Metadata? Metadata is data that describes other data. It’s most often used in digital files, but it’s

What Does Phishing Mean, Types, Risks And How To Prevent It
What Does Phishing Mean, Types, Risks And How To Prevent It What does phishing mean? Phishing is a type of

BYOD (Bring Your Own Device): Advantages and Disadvantages and Risks
BYOD (Bring Your Own Device): Advantages and Disadvantages and Risks What is a BYOD (Bring Your Own Device) Policy? BYOD

What is Penetration testing? Methods & Steps involved
Penetration testing is a method to detect vulnerabilities in IT systems and networks. This is an ongoing process; some of

Twitter to pay $150 Million fine over using Phone Numbers for Targeted Ads
Twitter to pay $150 Million fine over using Phone Numbers for Targeted Ads Recently Twitter has accepted that it had

Uber’s Internal Networks Breached!
Uber’s Internal Networks Breached!: Uber Suspects Lapsus$ is responsible. On Thu, 15-Sep-2022, Uber discovered and admitted that its internal network

Cybercriminals Stole LinkedIn and Indeed Profiles to Apply for Crypto Jobs
According to a recent report by Mandiant’s Security researchers, North Korean hackers have targeted the jobs listed on LinkedIn and

$100 Million stolen through Cryptocurrency
$100 Million stolen through Cryptocurrency Cybercriminals stole $100 million in Cryptocurrency after hacking Horizon, a so-called Blockchain bridge. Harmony, the

The next generation of Authentication
The next generation of Authentication: Passwordless login techniques that are available today Authentication is the process of verifying a user’s

Benefits of Iso 27001 and How it can help your business?
The information security procedures that are in place within your Organization are designed to protect the Confidentiality, Integrity and Availability