top of page
Search


echoudhury77
Jan 31, 20232 min read
The T-Mobile Breaches
On January 19th T-Mobile reported another breach of their data, this being their second in as many years and their 8th since 2018. This...
15 views0 comments


echoudhury77
Dec 5, 20222 min read
AdWare: Intrusive Apps Hiding In Your Phone
Nobody likes being forced to watch ads. Unfortunately, however, there is a lot of money to be made by bad faith actors if they are able...
18 views0 comments


echoudhury77
Dec 5, 20225 min read
Don't Get Roasted by Holiday Scams
Shopping in the present world can be fun and with everything that can be bought online makes shopping convenient and easy. Since shopping...
13 views0 comments


echoudhury77
Oct 13, 20222 min read
Red Team / Blue Team
Security is one of the most important parts of an organization, and with most vital information being digital, cybersecurity is more...
22 views0 comments


echoudhury77
Oct 6, 20223 min read
Reporting SPAM Texts
Have you ever gotten a text that seemed too good to be true or just downright seemed like something is off? If you have then you have...
19 views0 comments


echoudhury77
Sep 28, 20222 min read
Risks of Linking Accounts
Generally, when downloading a new app, you’re prompted to create an account. During that time, it may ask you to link your accounts by...
34 views0 comments




echoudhury77
Jun 27, 20222 min read
Cookies and You
What are cookies? Cookies are small files which contain pieces of data that are used to identify your computer when you are on a network....
19 views0 comments


echoudhury77
Jun 21, 20223 min read
Has your Mobile Device been Hacked?
Since people are on their phones all the time it is easy to detect a change in its normal functions. Whether it’s a change in the way...
22 views0 comments


echoudhury77
May 3, 20223 min read
Working from Home? Here's why Awareness is a Priority
Living through the pandemic has driven shifts in the way people socialize, eat, and work. Businesses worldwide were forced to shut down...
24 views0 comments


echoudhury77
Mar 15, 20223 min read
Cyber War - Anonymous and The Russian Invasion of Ukraine
In a recent turn of events, the Russian invasion of Ukraine has been in full development. Although the tension has been building up for a...
24 views0 comments


echoudhury77
Jan 24, 20222 min read
Stop using "Free" Wi-Fi!
Wi-Fi is everyone’s best friend when you want to watch videos or download things on your mobile devices. The internet speed of a mobile...
35 views0 comments


echoudhury77
Jan 18, 20225 min read
Botnets
Botnet is used to refer to a collection of computers linked together to automate tasks. Generally, botnets themselves are not a threat to...
28 views0 comments


echoudhury77
Jan 12, 20222 min read
The Dark Sides of the Web
The terms “deep web” and “dark web” are used interchangeably, however there is a difference between the two. Deep web refers to anything...
25 views0 comments


echoudhury77
Dec 15, 20213 min read
Metadata is a treasure trove.
When using your computer, there is a lot of data created beyond what is normally accessed by individuals. Such information can include...
18 views0 comments


echoudhury77
Oct 25, 20212 min read
The Human Element
The Human Element is one of the most valuable assets of any organization. In business, people are considered resources because they are...
16 views0 comments


echoudhury77
Oct 25, 20212 min read
Protect your Facebook profile. Your Privacy depends on it.
Have any of your social media accounts been hacked in the past? A good majority of internet users have experienced some form of data...
19 views0 comments


echoudhury77
Oct 21, 20212 min read
Could Your Business Partner Get You Hacked?
A supply chain attack is a cyber-attack that infiltrates the user’s computer through a third-party program that has access to your system...
22 views0 comments


echoudhury77
May 12, 20215 min read
The Threat of Phone & E-mail Attacks on Restaurants
By Hunter McCurry This week’s article will cover attacks and scams executed on restaurants by cybercriminals and scammers. These types of...
25 views0 comments


echoudhury77
May 6, 20212 min read
When China used LinkedIn for Espionage
Facebook has over 2.8 Billion users. LinkedIn has over 740 Million members. Twitter has over 350 Million users. Instagram has over 1...
20 views0 comments
bottom of page