Cyber security – a medicine against technology-related anxiety?

The average time between cyber-attacks is estimated to be only 39 seconds, leaving a lot of us feeling like sitting ducks. Can technology be of help here? The letter contained a scarce explanation of a data breach and money being stolen. “We are deeply sorry to inform you…”. Mr. Somchai lost his whole paycheck.  Disgruntled, the 60-year-old decided to give up the convenience of online banking. Now he goes through a hassle of visiting a bank branch every time he needs to make a transfer. He has learned the hard…

Read More

TikTok faces Indian backlash over a video allegedly glorifying acid attack

Now #BanTikTok is trending Popular video creation and sharing app TikTok is facing a sustained backlash across Indian social media for publishing a video allegedly glorifying acid attacks on women. The video has since been taken down but the social app continues to face the heat.  Created by Faizal Siddiqui, brother of popular TikTok star Amir Siddiqui, the video had shown the person throwing water on a girl that transitions on to her face that shows makeup similar to acid burns marks. The federal government had already warned social media…

Read More

How to Remove Malware from Android | Secure Your Android Device

malware exploit byte

How to Remove Malware from Android Attackers are day by day finding new ways to break the security of your smartphones. The main reason is, these attackers convince the user to install the malicious apps on your smartphone. Once it is done, then all the personal information in your smartphone is at stake. So, let’s take a look at How To Remove Malware From Android. How to know that your Android Phone is infected with Malware? It is important to know the normal behavior of your smartphone to understand its…

Read More

iOS 13 problems: how to fix issues in iOS 13.4.1

iso13

Apple’s iOS 13 update introduced plenty of long-awaited features, but along with Dark Mode and other improvements comes the inevitable iOS 13 problems, bugs and other issues that spring up alongside big software changes. Some of these are iOS 13 bugs are minorly annoying, while others seriously interrupt features or even parts of the user interface. If you’ve run into problems, chances are someone else has, too – and we’ll try to list each and every one. We’ll list every issue we can find, along with workarounds in the meantime…

Read More

The largest available hard disk is still a 16TB drive

Storage giant Seagate unveiled two new hard disk drives with a 16TB capacity earlier this year and, for once, the news wasn’t all about data centers. Seagate Exos X16 16TB HDD – $387.55 (around £310/AU$610)At just over $24 per TB, this is a fantastic deal for those searching for a drive to rule them all – an SSD of the same capacity will cost you almost eight times as much. Bear in mind, 16TB is a lot of data to lose, so make sure you back it up! Provantage is…

Read More

What is IOT?

The Internet of Things (IOT) is an important and emerging topic in the field of technology, economics and in society in general. It is referred to as the web of connected devices, made possible from the intersection between machine-to-machine communications and big data analytics. The IOT is a future-facing development of the internet and abilities of physical devices that eventually norrowing the gap between the virtual world and the physical world. This section deals with some of the important IOT consepts which one should be familiar with to understand the…

Read More

Importance of Security

Today, almost every company is becoming completely networked, exchanging information almost instantly. Even the most routine tasks rely on computers for storing and accessing information. A company’s intellectual assets not only differentiate it from its competition, but can also mean the difference between profit and loss. Consequently, it is of the utmost importance to secure these assets from outside threats. The scope of information security is vast, and the objective of this course is to give participants a comprehensive body of knowledge to help them secure information assets under their…

Read More

What is PKI?

A PKI is a Public-Key Infrastructure. It is an infrastructure that allows you to recognize which public key belongs to whom. The classical description is as follows. There is a central authority that is called the Certificate Authority, or CA for short. The CA has a public/private key pair (e.g., an RSA key pair) and publishes the public key. We will assume that everybody knows the CA’s public key. As this key remains the same over long periods of time, this is easy to accomplish. The Universal PKI The ultimate…

Read More

What is Windows Powershell?

The Linux operating system has long offered more power and flexibility to its administrators through shell scripting. However, Microsoft Windows lacked this flexibility, because of the limited capabilities of the command prompt. To overcome this limitation, Microsoft introduced PowerShell to efficiently automate tasks and manage configurations. It is built on top of the .NET Framework and provides complete access to COM and WMI. What is its application in hacking? If you are able to compromise a target system running Windows operating system, then using PowerShell, you can do many useful…

Read More

What is Worm?

Computer worm are malicious program that replicate, execute, and spread across the network connections independently without human interaction. Most of the worms are created only to replicate and spread across a network, consuming available computing resources; however, some worms carry a payload to damage the host system. Attackers use worm payload to install backdoors in infected computers, which turns them into zombies and creates botnet; these botnets can be used to carry further cyber attacks. How Computer Worm Work? Worms can be transmitted via software vulnerabilities. Or computer worms could…

Read More