Journal

Facebook 2FA Phish Scam
Facebook 2FA Phish Scam Reported by Sophos Recently, Social Media platforms are being widely used for carrying out various types

What Is Principle of Least Privilege & Why Do You Need It?
What Is the Principle of Least Privilege & Why Do You Need It? What Is the Principle of Least Privilege?

7 Really easy steps to prevent ransomware
What is ransomware? A ransomware is a type of malware that restricts access to the infected device, or threatens to

Should removable media be encrypted
We all use a variety of removable media in our daily lives, both for personal and professional use. We tend

Apple’s Lockdown Mode – Explained!
Apple’s Lockdown Mode – Explained! Apple has announced a new device protection feature known as “lockdown mode”. This mode severely

Understanding CERT-In’s new VPN Rules
Understanding CERT-In’s new VPN Rules CERT-In (The Indian Computer Emergency Response Team) announced a set of rules for VPN Providers

What is Cloud Security?
Introduction Cloud computing has been hailed as the future of business, with its ability to offer cheaper and more flexible

How Internal Audits can Help You Prevent Data Breaches?
Introduction A data breach is an event in which unauthorised individuals gain access to a company’s computers, networks or mobile

Intrusion Detection System [IDS] vs Intrusion Prevention System [IPS]
Introduction Intrusion Detection Systems [IDS] and Intrusion Prevention Systems [IPS] are two of the most important tools in any cybersecurity

Firewall – Are You Protected?
What is a firewall? A firewall is a device, software, or system that prevents unauthorised access to or from a

How to configure Privacy settings on Social Media Accounts
How to configure Privacy settings on Social Media Accounts Social media has changed the way we experience and engage with

Apple and Facebook Conned By Hackers
Tech Giants Apple and Facebook (Meta) were scammed by a Hacking Group named Lapsus$ leading to massive data leaks from