Journal
Malware Attack – Common ways an Android phone can get infected.
What is Malware? Malware is short for “malicious software.” It’s a general term that refers to any type of software
What is Metadata? How can it be useful in Cyber Forensics?
Introduction: What is Metadata? Metadata is data that describes other data. It’s most often used in digital files, but it’s
What Does Phishing Mean, Types, Risks And How To Prevent It
What Does Phishing Mean, Types, Risks And How To Prevent It What does phishing mean? Phishing is a type of
BYOD (Bring Your Own Device): Advantages and Disadvantages and Risks
BYOD (Bring Your Own Device): Advantages and Disadvantages and Risks What is a BYOD (Bring Your Own Device) Policy? BYOD
What is Penetration testing? Methods & Steps involved
Penetration testing is a method to detect vulnerabilities in IT systems and networks. This is an ongoing process; some of
Twitter to pay $150 Million fine over using Phone Numbers for Targeted Ads
Twitter to pay $150 Million fine over using Phone Numbers for Targeted Ads Recently Twitter has accepted that it had
Uber’s Internal Networks Breached!
Uber’s Internal Networks Breached!: Uber Suspects Lapsus$ is responsible. On Thu, 15-Sep-2022, Uber discovered and admitted that its internal network
Cybercriminals Stole LinkedIn and Indeed Profiles to Apply for Crypto Jobs
According to a recent report by Mandiant’s Security researchers, North Korean hackers have targeted the jobs listed on LinkedIn and
$100 Million stolen through Cryptocurrency
$100 Million stolen through Cryptocurrency Cybercriminals stole $100 million in Cryptocurrency after hacking Horizon, a so-called Blockchain bridge. Harmony, the
The next generation of Authentication
The next generation of Authentication: Passwordless login techniques that are available today Authentication is the process of verifying a user’s
Benefits of Iso 27001 and How it can help your business?
The information security procedures that are in place within your Organization are designed to protect the Confidentiality, Integrity and Availability
Facebook 2FA Phish Scam
Facebook 2FA Phish Scam Reported by Sophos Recently, Social Media platforms are being widely used for carrying out various types