top of page
Search


Deep Learning vs. Machine Learning
Machine learning and deep learning are vital to daily Internet activities everywhere. It’s how Netflix knows which shows you are...

echoudhury77
Nov 1, 20212 min read
21 views
0 comments


Cyber Security in the Construction Industry
When it comes to industries where cyber security is important, the construction industry normally doesn’t come into mind. Part of the...

echoudhury77
Oct 28, 20213 min read
14 views
0 comments


What's in a word? Stop using passwords!
The difference between a password and a passphrase can be the difference in having personal data leaked to thousands, if not millions. A...

echoudhury77
Oct 27, 20212 min read
26 views
0 comments


Biggest Cyber Breaches of 2021..and it's not over yet.
As the amount of protection around data increases, so does the ingenuity of attackers. Even the largest and most secure companies and...

echoudhury77
Oct 26, 20213 min read
33 views
0 comments


The Human Element
The Human Element is one of the most valuable assets of any organization. In business, people are considered resources because they are...

echoudhury77
Oct 25, 20212 min read
21 views
0 comments


Protect your Facebook profile. Your Privacy depends on it.
Have any of your social media accounts been hacked in the past? A good majority of internet users have experienced some form of data...

echoudhury77
Oct 25, 20212 min read
19 views
0 comments


Could Your Business Partner Get You Hacked?
A supply chain attack is a cyber-attack that infiltrates the user’s computer through a third-party program that has access to your system...

echoudhury77
Oct 21, 20212 min read
23 views
0 comments


You're Profiled and Tracked. By Algorithms.
The methods by which companies track and identify its users vary from company to company. But, some of the most widely used methods for...

echoudhury77
Oct 20, 20212 min read
27 views
0 comments


Are Keyword Warrants a threat to Privacy?
What Are Keyword Warrants? Many people do not understand how public the internet really is. All web searches, whether through a browser,...

echoudhury77
Oct 13, 20212 min read
34 views
0 comments


Seven Stages of a Cyber Attack
Advanced cyber threats occur in kill chains of up to seven stages. The term "kill chain" is referred to as the ability to stop an attack...

echoudhury77
Aug 2, 20213 min read
48 views
0 comments


Where Do All Those Ransomware Payments Go?
With the seemingly everyday occurrence of ransomware attacks and the suspected $350 million that the illegal industry pulled in, it is...

echoudhury77
Jul 14, 20212 min read
32 views
0 comments


Hiding Messages in Pictures Like a Spy
Steganography is the method of hiding a secret message in or on something that is public. It’s first recorded use was in 1499 in a book...

echoudhury77
Jul 8, 20212 min read
25 views
0 comments


Refine your Google Searches
Google has been around since 1997, with almost everyone using it's powerful search engine. Sometimes you don't always get the results...

echoudhury77
Jul 2, 20211 min read
19 views
0 comments


Why is Synchronized Security So Important?
As cyber criminals continue get more and more complex in their attacks, it’s important that organizations adapt to ever advancing...

echoudhury77
Jul 2, 20211 min read
26 views
0 comments


Top 5 Most Dangerous Ransomware Groups
In this age of ransomware, there are many different groups, but which among them are the most notable? Here is a small list of the groups...

echoudhury77
Jun 29, 20212 min read
35 views
0 comments


Think Before You Post: Threat of Real Time Information Sharing
In this age of social media, people are sharing more and more about themselves than they ever had before, but how much is too much?...

echoudhury77
Jun 25, 20211 min read
27 views
0 comments


Five Eyes: A Brief Rundown
In the world of global intelligence gathering and surveillance, one name reigns dominate. 5-Eyes. But who and what exactly is 5-Eyes?...

echoudhury77
Jun 22, 20212 min read
26 views
0 comments


Phishing Sites and How to Spot them
With threat actors constantly trying to break into a business’s network, its important to stay vigilant and know how to spot when an...

echoudhury77
Jun 17, 20212 min read
19 views
0 comments


DOJ Seize $2.5 Million Colonial Pipeline Ransomware Payment
In a June 7th press release, the Department of Justice announced that the FBI has seized 63.7 bitcoins from a wallet that belonged to the...

echoudhury77
Jun 15, 20211 min read
20 views
0 comments


2FA – What is it and why do you need it?
With the rise in cybercrime, it is now more important than ever to take cyber security seriously. One of the best steps to take to...

echoudhury77
Jun 10, 20212 min read
16 views
0 comments
bottom of page