You may have heard the term “Brute Force Attack” before. Maybe in some news about a company’s data breach? Or from some tech geek. Brute force is a cyber hack technique that cyber criminals still use (successfully) to this day. While a brute force attack is one of the most
What comes into your mind when you read the title? Probably, a bunch of people including your friends, family members and even your neighbors asking your wifi password right? While sometimes it’s okay to give your password to your close acquaintances, it is never justifiable to just share it with
We all have heard about them. Some of us even love the idea of being a hacker (ethical) When we hear the term “hacker” An image pops up in our head where a person is operating 10 computers at the same time to hack into some intelligence agency. While hackers
CVE (Common Vulnerabilities and Exposures) is a glossary database of technical terminology for cybersecurity defense specialists. But if you take your privacy seriously, you can do well by learning about these terms as well. What is CVE? CVE is publicly available and it holds all the common vulnerabilities and exposures
If you’re a journalist, activist or anyone who often (or occasionally) needs to send sensitive information to someone else (without compromising or showing your identity) you’ll understand the importance of an anonymous email. Dropping off tips (carrying sensitive information) is now easier than ever due to the presence of interconnected
Congratulations on getting a new router. Along with the router, you get a new password as well. This password is not only long, boring but also very difficult to remember. Now you have to memorize it or write it down in case someone needs to connect with your wifi. But
The whitelist can be a life-savior to people who are tired of being bombarded with unwanted websites, ads, and people. Websites, IP addresses and ads that you don’t want in your digital life can be barred by excluding them from your whitelist. Let’s discover more about whitelisting. What is whitelisting?
The logic bomb resembles ticking bombs in its characteristics. You have seen in movies how a ticking bomb works. You set a time & date and at that very moment, it explodes. A logic bomb is just like that, except it is a malicious piece of code that damages your