echoudhury77Oct 13, 20212 minAre Keyword Warrants a threat to Privacy?What Are Keyword Warrants? Many people do not understand how public the internet really is. All web searches, whether through a browser,...
echoudhury77Aug 2, 20213 minSeven Stages of a Cyber AttackAdvanced cyber threats occur in kill chains of up to seven stages. The term "kill chain" is referred to as the ability to stop an attack...
echoudhury77Jul 14, 20212 minWhere Do All Those Ransomware Payments Go?With the seemingly everyday occurrence of ransomware attacks and the suspected $350 million that the illegal industry pulled in, it is...
echoudhury77Jul 8, 20212 minHiding Messages in Pictures Like a SpySteganography is the method of hiding a secret message in or on something that is public. It’s first recorded use was in 1499 in a book...