Khalid BalajemFintech Risk AssessmentThe complexity of the financial industry has increased exponentially with the rise of fintech, as new technologies such as machine…Feb 1, 2021Feb 1, 2021
Khalid BalajemEncryption of DNS EnterpriseWe were warned before by the National Security Agency (NSA) has that adoption of encrypted DNS services can create chaos and lead to a…Jan 25, 2021Jan 25, 2021
Khalid BalajemWhat is SandboxingSandboxes digs into secluded environments to screen certain malware types without giving that malware a chance to spread. From the results…Jan 18, 2021Jan 18, 2021
Khalid BalajemIs WhatsApp Facebook Migration Safe?WhatsApp announced it has update its privacy and will migrate its data to facebook on February 8th 2021. As per the updates, users must…Jan 11, 2021Jan 11, 2021
Khalid BalajemGoogle Docs VulnerabilityGoogle has patched a flaw to its docs that allowed a hacker to take screenshots of user documents. The vulnerability with the “Send…Jan 4, 2021Jan 4, 2021
Khalid BalajemPhishing is for everyoneWhen Godaddy decided to send phishing email to all of their employees, the cyber security team knew everyone will fall for it. Godaddy…Dec 29, 2020Dec 29, 2020
Khalid BalajemRespected Cyber Company HackedWhen one of the most respected cybersecurity company in the United States FireEye got hacked, it shows something isn’t right anymore. It…Dec 22, 2020Dec 22, 2020
Khalid BalajemMicrosoft Office 365 — HackingMicrosoft may have changed how we communicate through office 365 email but it come with a price. Office 365 is used by hackers around the…Dec 14, 2020Dec 14, 2020
Khalid BalajemKALI LINUX — The Powerful Arsenal for Cyber PenetrationWhat is in hackers mind is to have control. Because Linux has much to offer any computer user, It has become popular with hackers. The…Dec 7, 2020Dec 7, 2020
Khalid BalajemAvoid Cheap Chinese Made RoutersIt is reported that Chinese made routers have backdoors in them that are already being exploited by hackers. Cyber analysts have…Nov 30, 2020Nov 30, 2020