Fintech Risk AssessmentThe complexity of the financial industry has increased exponentially with the rise of fintech, as new technologies such as machine…Feb 1, 2021Feb 1, 2021
Encryption of DNS EnterpriseWe were warned before by the National Security Agency (NSA) has that adoption of encrypted DNS services can create chaos and lead to a…Jan 25, 2021Jan 25, 2021
What is SandboxingSandboxes digs into secluded environments to screen certain malware types without giving that malware a chance to spread. From the results…Jan 18, 2021Jan 18, 2021
Is WhatsApp Facebook Migration Safe?WhatsApp announced it has update its privacy and will migrate its data to facebook on February 8th 2021. As per the updates, users must…Jan 11, 2021Jan 11, 2021
Google Docs VulnerabilityGoogle has patched a flaw to its docs that allowed a hacker to take screenshots of user documents. The vulnerability with the “Send…Jan 4, 2021Jan 4, 2021
Phishing is for everyoneWhen Godaddy decided to send phishing email to all of their employees, the cyber security team knew everyone will fall for it. Godaddy…Dec 29, 2020Dec 29, 2020
Respected Cyber Company HackedWhen one of the most respected cybersecurity company in the United States FireEye got hacked, it shows something isn’t right anymore. It…Dec 22, 2020Dec 22, 2020
Microsoft Office 365 — HackingMicrosoft may have changed how we communicate through office 365 email but it come with a price. Office 365 is used by hackers around the…Dec 14, 2020Dec 14, 2020
KALI LINUX — The Powerful Arsenal for Cyber PenetrationWhat is in hackers mind is to have control. Because Linux has much to offer any computer user, It has become popular with hackers. The…Dec 7, 2020Dec 7, 2020
Avoid Cheap Chinese Made RoutersIt is reported that Chinese made routers have backdoors in them that are already being exploited by hackers. Cyber analysts have…Nov 30, 2020Nov 30, 2020