cybersecurity
Our personal, digital, national and military security depend on a safe cyber space.
What Happens When You Log In with Your Facebook or Google Account?
We all have seen the button that says “Login with Google” or “Login with Facebook” and if you are reading this, chances are, you have probably used it too. So, what exactly happens when you use this kind of logins instead of a traditional “sign up for an account and then login” and how does this process actually work! Well, you’ve come to the right place.
By Joydwip Mohajon5 years ago in 01
How To Ensure Your Business Data is Secure
How To Ensure Your Business Data is Secure If you have a computer and internet connection, then there are plenty of reasons to start using a high-quality anti-virus program, and it is especially important to find out how to make sure your computer is kept safe. You can get an online anti-virus software program or you can buy an anti-virus product that has been designed specifically to protect computers from viruses and spyware.
By Maggie Bloom5 years ago in 01
4 Ways Your Browser Leaks Personal Information
the browser can easily become be a leaky faucet when it comes to identifying personal details that could then be exploited by attackers for financial gain. Here’s how your browser might be compromising your privacy and what you can do about it.
By Student Matters5 years ago in 01
Evolution of Ransomware: Growing Threat To The Organizations
Ransomware is known to businesses of all kinds, small to medium to large, and to individuals as the “prominent threat” since the mid-2000s. Back in 2017, the Crime Internet Complaint Center (IC3) of the FBI had received 1783 complaints on ransomware attacks that had extorted the victims and forced them to pay a ransom of over $2.3 million. Considering these complaints, it is just those cases of ransomware attacks that had been reported.
By Bruno Marcoux5 years ago in 01
Video Hosting for WordPress: Secure Customisable Player Plugin
Creating a website on WordPress is easy but online video hosting for WordPress is a little difficult. There are so many parameters you need to take into consideration for WordPress video hosting. There are multiple platforms and unlimited plugins available in the market and it is difficult to choose from one of them. Especially for those content creators and distributors who don’t know how to implement the things technically.
By Rahul Rana5 years ago in 01
5 Simple Online Safety Tips to Protect You and Your Data
The internet can come back to bite you. What you post to your public profile after a night out in college could seem harmless, but it might be the reason you're not hired for your dream job ten years later. Or you might be dealing with hackers, who mine your unprotected information and use it to steal your credit card or identity.
By Paisley Hansen5 years ago in 01
List of Security Tools to Secure Your Applications
Strategically, security testing tools blend into a DevOps workflow, essentially forming a DevSecOps model while improving production efficiency and minimizing software development costs. Such tools allow you to include testing and remediation of potential vulnerabilities throughout the Software Development Lifecycle (SDLC) as well as post-delivery Run & Maintain phases. Enabling a DevSecOps model ensures developers to adopt a secured development and delivery cycle without lagging productivity and attributing ‘security’ at the bottom of the SDLC.
By Sudip SenGupta5 years ago in 01
Blind Cross-Site Scripting in Zendesk Chat worth of $2000
Way back in 2016 I participated in Zendesk 2016 holiday promotion in Hackerone, then I reported a Cross-Site Scripting Issue in the Zendesk platform Affecting the Zendesk Chat product and they fixed it immediately.
By EnjoyLife1015 years ago in 01
Difficulties in CyberSecurity and Tips to Help You Success
This article was inspired by one of my friends who asked me ' hey do you know what's like to work as cybersecurity?' and I thought this was an interesting topic so as a programmer I had to do research on it. Read it if you were considering about it as well!
By Black tech5 years ago in 01








