top of page
Search




echoudhury77
- Aug 12, 2022
- 2 min
Simple steps to better Small Business security
Keeping up with cybercrime can be difficult. Cyber criminals have become more advanced and smarter with their attacks. Often, smaller...
18 views0 comments


echoudhury77
- Jul 22, 2022
- 2 min
Sextortion is a Serious Crime
Sextortion is a serious crime that occurs when someone threatens to expose/post sensitive images or videos of their victims, often as a...
28 views0 comments


echoudhury77
- Jun 27, 2022
- 2 min
Cookies and You
What are cookies? Cookies are small files which contain pieces of data that are used to identify your computer when you are on a network....
10 views0 comments


echoudhury77
- Jun 21, 2022
- 3 min
Has your Mobile Device been Hacked?
Since people are on their phones all the time it is easy to detect a change in its normal functions. Whether it’s a change in the way...
16 views0 comments


echoudhury77
- May 3, 2022
- 3 min
Working from Home? Here's why Awareness is a Priority
Living through the pandemic has driven shifts in the way people socialize, eat, and work. Businesses worldwide were forced to shut down...
17 views0 comments


echoudhury77
- Apr 21, 2022
- 6 min
Credit Card Theft
In about a decade, the popularity of using plastic cards as a form of payment has risen; it is now more uncommon to find someone paying...
13 views0 comments


echoudhury77
- Mar 15, 2022
- 3 min
Cyber War - Anonymous and The Russian Invasion of Ukraine
In a recent turn of events, the Russian invasion of Ukraine has been in full development. Although the tension has been building up for a...
17 views0 comments


echoudhury77
- Jan 24, 2022
- 2 min
Stop using "Free" Wi-Fi!
Wi-Fi is everyone’s best friend when you want to watch videos or download things on your mobile devices. The internet speed of a mobile...
23 views0 comments


echoudhury77
- Jan 18, 2022
- 5 min
Botnets
Botnet is used to refer to a collection of computers linked together to automate tasks. Generally, botnets themselves are not a threat to...
19 views0 comments


echoudhury77
- Dec 15, 2021
- 3 min
Metadata is a treasure trove.
When using your computer, there is a lot of data created beyond what is normally accessed by individuals. Such information can include...
10 views0 comments


echoudhury77
- Nov 19, 2021
- 3 min
Deepfake...the Good, the Bad, the Ugly
What if someone could fake your identity, not on paper with a fake I.D., but on a video as if you would’ve taken a video yourself? That...
17 views0 comments


echoudhury77
- Oct 25, 2021
- 2 min
The Human Element
The Human Element is one of the most valuable assets of any organization. In business, people are considered resources because they are...
7 views0 comments


echoudhury77
- Oct 25, 2021
- 2 min
Protect your Facebook profile. Your Privacy depends on it.
Have any of your social media accounts been hacked in the past? A good majority of internet users have experienced some form of data...
12 views0 comments


echoudhury77
- Oct 21, 2021
- 2 min
Could Your Business Partner Get You Hacked?
A supply chain attack is a cyber-attack that infiltrates the user’s computer through a third-party program that has access to your system...
13 views0 comments


echoudhury77
- Oct 20, 2021
- 2 min
You're Profiled and Tracked. By Algorithms.
The methods by which companies track and identify its users vary from company to company. But, some of the most widely used methods for...
21 views0 comments


echoudhury77
- May 12, 2021
- 5 min
The Threat of Phone & E-mail Attacks on Restaurants
By Hunter McCurry This week’s article will cover attacks and scams executed on restaurants by cybercriminals and scammers. These types of...
20 views0 comments


echoudhury77
- May 6, 2021
- 2 min
When China used LinkedIn for Espionage
Facebook has over 2.8 Billion users. LinkedIn has over 740 Million members. Twitter has over 350 Million users. Instagram has over 1...
13 views0 comments


echoudhury77
- Oct 22, 2020
- 2 min
Ways to elevate your Cybersecurity at home
As more and more people continue to work from home due to COVID-19, quarantine, social distancing, and required Work-From-Home, hackers...
15 views0 comments


echoudhury77
- Dec 23, 2019
- 1 min
What your Devices know about you
What do your devices know about you
24 views0 comments
bottom of page