Gone are the days when users of software applications would always rely on text commands or graphical user interfaces (GUIs) to get their jobs done. Instead, we seem to have […]
Have you ever been bothered by someone on the web? Do you think your company might be at risk due to hideous information robbers? Do you know what Cyberstalking is? […]
This case study is a combination of two attacks password and phishing. Password attack is one of commonly happen attack in our society due to lack of awareness about cyber […]
Yet another four-letter buzzword is charming the industries & Information Technology Industries. Latest four letter thrill is called GDPR (General Data Protection Regulation) Due to drastic changes in technologies European Union has initiate […]
Introduction to Blockchain Blockchain is a decentralized distributed database (ledger) system. It is distributed because there is not a single repository held or owned by one person (Parties or Miner). […]
One common mistake that people make when the topic of a computer virus arises is to refer to a worm, Bot or a Trojan horse as a virus. While the […]
The Signaling System No 7 (SS7), also known as Common Channel Signaling System 7 (CCSS7) or Common Channel Interoffice Signaling 7 (CCIS7), is a set of protocols developed in 1975 […]