WHAT IS JOKER MALWARE ?? Joker malware is a malicious act that is used to steal victim’s data , information via message, contact lists and device info . According to the quick heal report , at launch these applications ask for notification access , which is used to get notification data , these application thenContinue reading “JOKER MALWARE”
Category Archives: Uncategorized
CYBER THREAT
What is cyber threat ? Cyber threat is a malicious act that is used to harm , steal and delete data . What types of cyber threat ? 1 . Malware : – Malware is a software that does malicious task on a device to currupt or control over a system. 2 . Spyware: –Continue reading ” CYBER THREAT”
ZERO-DAY ATTACK
WHAT IS ZERO-DAY ATTACK ?? Zero-day attack is the attack which is done through by vulnerable . In this process hackers attack through find a vulnerable in your system or program . WHO CARRIED ZERO-DAY ATTACK ?? Hacktivist : – Hackers motivated by political or social cause which is motivated them and they prefer theirContinue reading “ZERO-DAY ATTACK”
CRYPTOCURRENCY
A cryptocurrency is a form of digital asset based on a network that is distributed across a large number of computers. This decentralized structure allows them to exist outside the control of governments and central authorities. The word “cryptocurrency” is derived from the encryption techniques which are used to secure the network. Blockchains, which areContinue reading “CRYPTOCURRENCY”
JBS DATA BREACH
A ransomwareattack on JBS, the world’s largest meat supplier, has been linked to a criminal organization based out of Russia, according to the US government. The company, which is headquartered in Brazil and operates worldwide through various subsidiaries, annonced on monday(May 31) that its North American and Australian systems had been the victim of a cyber-attack. According toContinue reading “JBS DATA BREACH”
PENTRATION TESTING
The purpose of penetration testing is to detect security weaknesses and issues. This testing can also be used to test an organization’s security policy, its attachment to compliance requirements, its employee’s security awareness, and the company’s capability to pick up and react to security incidents. The final goal is to detect security problems and vulnerabilities.Continue reading “PENTRATION TESTING”
CYBER ATTACK
CYBER ATTACK : — A cyber attack is any attempt to gain unauthorized access to a computer, computer network or computing system with intent to cause damage . Cyber attacks aims to disable, currupt , or control computer system or to alter block , delete and steal the data held within these system . TYPESContinue reading “CYBER ATTACK”
HOW TO BOOST YOUR DIGITAL SECURITY WITH PASSWORD MANAGER
If you wanted to private your data follow password manager A long , complex password is very secure digital protection everyone must have however , creating a long , complex password that you will recall easily every time you need it is not an easy task for most of us . But this challenge shouldContinue reading “HOW TO BOOST YOUR DIGITAL SECURITY WITH PASSWORD MANAGER”
DATA BREACHES IN MC DONALD’S
In this year the biggest cases of cyber attacks Mc Donald’s become has the latest company to be hit by a data breach after unauthorized activity on its network to personal data of some customers in South Korea and Taiwaan McDonald’s Corp said that it quickly identified and contained the incident amd that the throughContinue reading “DATA BREACHES IN MC DONALD’S”
MAN-IN-THE-MIDDLE ATTACK
WHAT IS THE MAN-IN -THE MIDDLE ATTACK ?? Man in the middle is a type of cyberattack where the hackers relays and secretly enters two parties communication who believes they connect directly . Ex : evasdropping HOW DO PREVENT MAN IN THE MIDDLE ATTACK ?? Use a VPN to encrypt your web traffic , anContinue reading “MAN-IN-THE-MIDDLE ATTACK”
