Cyber Security: Game Threats
Online gaming is reaching a new zenith. Did you know: The online gaming industry of India will add approximately 190 million gamers by the year 202...
Cyber Security: DoS and DDoS
Denial of Services (DoS): An attack to make a system or network resource unavailable to its intended users
Distributed Denial-of-Service (DDo...
Cyber Security: Wi-fi Hacks
Yes, a Wi-Fi router can be hacked and you may not even be aware of the same.
Highlights:
- Routers with weak encrypt...
Cyber Security: Man-In-The-Middle Attack
MITM – Eavesdropping or Interception of the communication between two targets for malicious reasons. This type of attack allows the attacker to lis...
Cyber Security: Password Theft
Password theft is a common threat in digital age and is the main vector for serious crimes like identity theft and fraud. Passwords are the protect...
Cyber Security: Phishing a variant of Social Engineering
Do you know Phishing is a variant of social engineering – thus, evading controls via trust. Phishing attacks and crime have grown in large numbers ...
Cyber Security: Preventing Email Spoofing
E-Mail Spoofing one of the most common and top vector used by cybercriminals for unethical activities and one of the preferred types of email ...
Cyber Security: Malware
Do you rouse and rummage around for your mobile phone?
In the earlier days, technology was restricted to academics and business then an...
About Rakhi R Wadhwani
Rakhi R Wadhwani is a published author, auditor and trainer in cyber security having over 20 years+ experience working as a Technology Professional...