Cyber Response Plan for Cyber Security – Need of the Hour – 3/4
We went through the whole CRP life cycle splitting it up into stages to better understand the steps taken in […]
Maze Ransomware Attack on a leading MNC
Cognizant Technology Solutions was hit by a ransomware attack known as Maze. This attack unfortunately comes on top of the […]
NIST Risk management framework in cyber security
NIST provides a risk management framework that can be utilized in the cyber security. The framework contains six steps, starting […]
The world of digital forensics – 2/2
The order volatility is basically listing the order of steps to be performed, like what do you go to first, […]
Juice Jacking – A new cyber threat!
Juice jacking is a new type of cyber-attack that compromise the data found on mobile phones when they are being […]
The world of digital forensics- 1/2
Digital forensics is the process of collecting, storing, and quantifying digital evidence to be used as the result of some […]
Deepfake technology! More threat than amusement
The Deepfake videos such as Obama’s public service announcement video, Nancy Pelosi slowed down video, Donald Trump lectures Belgium video, […]
Career Options With Blockchain Technology
As a beginner, a person can take up the roles such as Blockchain developer, Blockchain engineer, Bitcoin Miner, or Blockchain […]
Cyber Security in 2020! Be cyber aware!
Approximately 55% of the world’s population uses the internet. This leaves a lot of room for cyber criminals, so much […]
Cyber attacks in 2020: how they will affect you and how to prevent them.
Cyber criminals use information about the coronavirus outbreak as bait to spread ‘Emotet’ malware, Researchers at IBM X-Force warn that […]