top of page
Search


echoudhury77
Jun 21, 20223 min read
Has your Mobile Device been Hacked?
Since people are on their phones all the time it is easy to detect a change in its normal functions. Whether it’s a change in the way...
22 views
0 comments


echoudhury77
May 3, 20223 min read
Working from Home? Here's why Awareness is a Priority
Living through the pandemic has driven shifts in the way people socialize, eat, and work. Businesses worldwide were forced to shut down...
24 views
0 comments


echoudhury77
Apr 21, 20226 min read
Credit Card Theft
In about a decade, the popularity of using plastic cards as a form of payment has risen; it is now more uncommon to find someone paying...
30 views
0 comments


echoudhury77
Mar 15, 20223 min read
Cyber War - Anonymous and The Russian Invasion of Ukraine
In a recent turn of events, the Russian invasion of Ukraine has been in full development. Although the tension has been building up for a...
24 views
0 comments


echoudhury77
Jan 24, 20222 min read
Stop using "Free" Wi-Fi!
Wi-Fi is everyone’s best friend when you want to watch videos or download things on your mobile devices. The internet speed of a mobile...
35 views
0 comments


echoudhury77
Jan 18, 20225 min read
Botnets
Botnet is used to refer to a collection of computers linked together to automate tasks. Generally, botnets themselves are not a threat to...
28 views
0 comments


echoudhury77
Dec 15, 20213 min read
Metadata is a treasure trove.
When using your computer, there is a lot of data created beyond what is normally accessed by individuals. Such information can include...
18 views
0 comments


echoudhury77
Nov 19, 20213 min read
Deepfake...the Good, the Bad, the Ugly
What if someone could fake your identity, not on paper with a fake I.D., but on a video as if you would’ve taken a video yourself? That...
25 views
0 comments


echoudhury77
Oct 25, 20212 min read
The Human Element
The Human Element is one of the most valuable assets of any organization. In business, people are considered resources because they are...
16 views
0 comments


echoudhury77
Oct 25, 20212 min read
Protect your Facebook profile. Your Privacy depends on it.
Have any of your social media accounts been hacked in the past? A good majority of internet users have experienced some form of data...
19 views
0 comments


echoudhury77
Oct 21, 20212 min read
Could Your Business Partner Get You Hacked?
A supply chain attack is a cyber-attack that infiltrates the user’s computer through a third-party program that has access to your system...
22 views
0 comments


echoudhury77
Oct 20, 20212 min read
You're Profiled and Tracked. By Algorithms.
The methods by which companies track and identify its users vary from company to company. But, some of the most widely used methods for...
27 views
0 comments


echoudhury77
May 12, 20215 min read
The Threat of Phone & E-mail Attacks on Restaurants
By Hunter McCurry This week’s article will cover attacks and scams executed on restaurants by cybercriminals and scammers. These types of...
25 views
0 comments


echoudhury77
May 6, 20212 min read
When China used LinkedIn for Espionage
Facebook has over 2.8 Billion users. LinkedIn has over 740 Million members. Twitter has over 350 Million users. Instagram has over 1...
20 views
0 comments


echoudhury77
Oct 22, 20202 min read
Ways to elevate your Cybersecurity at home
As more and more people continue to work from home due to COVID-19, quarantine, social distancing, and required Work-From-Home, hackers...
21 views
0 comments


echoudhury77
Dec 23, 20191 min read
What your Devices know about you
What do your devices know about you
32 views
0 comments


echoudhury77
Dec 19, 20192 min read
The Wangiri Scam
It seemed odd to me that a type of telephone scam that's been around for a while and raises it's head during the holidays would be called...
29 views
0 comments


echoudhury77
Nov 11, 20192 min read
Falling Down: Healthcare Information Security.
This post is courtesy of a guest writer with decades of experience in public and private healthcare. As a BSN and RN for over 20 years, I...
23 views
0 comments


echoudhury77
Aug 22, 20191 min read
What is...a BEC Attack?
A BEC (or Business Email Compromise) attack occurs when cyber criminals use social engineering combined with phishing and spear-phishing...
68 views
0 comments


echoudhury77
Jul 5, 20194 min read
Protecting your Privacy
Protecting your privacy in Windows 10.
26 views
0 comments
bottom of page