top of page
Search


Has your Mobile Device been Hacked?
Since people are on their phones all the time it is easy to detect a change in its normal functions. Whether it’s a change in the way...

echoudhury77
Jun 21, 20223 min read
Â
Â
Â


Working from Home? Here's why Awareness is a Priority
Living through the pandemic has driven shifts in the way people socialize, eat, and work. Businesses worldwide were forced to shut down...

echoudhury77
May 3, 20223 min read
Â
Â
Â


Credit Card Theft
In about a decade, the popularity of using plastic cards as a form of payment has risen; it is now more uncommon to find someone paying...

echoudhury77
Apr 21, 20226 min read
Â
Â
Â


Cyber War - Anonymous and The Russian Invasion of Ukraine
In a recent turn of events, the Russian invasion of Ukraine has been in full development. Although the tension has been building up for a...

echoudhury77
Mar 15, 20223 min read
Â
Â
Â


Stop using "Free" Wi-Fi!
Wi-Fi is everyone’s best friend when you want to watch videos or download things on your mobile devices. The internet speed of a mobile...

echoudhury77
Jan 24, 20222 min read
Â
Â
Â


Botnets
Botnet is used to refer to a collection of computers linked together to automate tasks. Generally, botnets themselves are not a threat to...

echoudhury77
Jan 18, 20225 min read
Â
Â
Â


Metadata is a treasure trove.
When using your computer, there is a lot of data created beyond what is normally accessed by individuals. Such information can include...

echoudhury77
Dec 15, 20213 min read
Â
Â
Â


Deepfake...the Good, the Bad, the Ugly
What if someone could fake your identity, not on paper with a fake I.D., but on a video as if you would’ve taken a video yourself? That...

echoudhury77
Nov 19, 20213 min read
Â
Â
Â


The Human Element
The Human Element is one of the most valuable assets of any organization. In business, people are considered resources because they are...

echoudhury77
Oct 25, 20212 min read
Â
Â
Â


Protect your Facebook profile. Your Privacy depends on it.
Have any of your social media accounts been hacked in the past? A good majority of internet users have experienced some form of data...

echoudhury77
Oct 25, 20212 min read
Â
Â
Â


Could Your Business Partner Get You Hacked?
A supply chain attack is a cyber-attack that infiltrates the user’s computer through a third-party program that has access to your system...

echoudhury77
Oct 21, 20212 min read
Â
Â
Â


You're Profiled and Tracked. By Algorithms.
The methods by which companies track and identify its users vary from company to company. But, some of the most widely used methods for...

echoudhury77
Oct 20, 20212 min read
Â
Â
Â


The Threat of Phone & E-mail Attacks on Restaurants
By Hunter McCurry This week’s article will cover attacks and scams executed on restaurants by cybercriminals and scammers. These types of...

echoudhury77
May 12, 20215 min read
Â
Â
Â


When China used LinkedIn for Espionage
Facebook has over 2.8 Billion users. LinkedIn has over 740 Million members. Twitter has over 350 Million users. Instagram has over 1...

echoudhury77
May 6, 20212 min read
Â
Â
Â


Ways to elevate your Cybersecurity at home
As more and more people continue to work from home due to COVID-19, quarantine, social distancing, and required Work-From-Home, hackers...

echoudhury77
Oct 22, 20202 min read
Â
Â
Â


What your Devices know about you
What do your devices know about you

echoudhury77
Dec 23, 20191 min read
Â
Â
Â


The Wangiri Scam
It seemed odd to me that a type of telephone scam that's been around for a while and raises it's head during the holidays would be called...

echoudhury77
Dec 19, 20192 min read
Â
Â
Â


Falling Down: Healthcare Information Security.
This post is courtesy of a guest writer with decades of experience in public and private healthcare. As a BSN and RN for over 20 years, I...

echoudhury77
Nov 11, 20192 min read
Â
Â
Â


What is...a BEC Attack?
A BEC (or Business Email Compromise) attack occurs when cyber criminals use social engineering combined with phishing and spear-phishing...

echoudhury77
Aug 22, 20191 min read
Â
Â
Â


Protecting your Privacy
Protecting your privacy in Windows 10.

echoudhury77
Jul 5, 20194 min read
Â
Â
Â
bottom of page