hacker

13 Ways To Avoid Cyber Security Threats

July 2, 2025 Adeniyi Salau 0

  In my previous article, I discussed some of the facts that you need to know about phishing and Business Email Compromise generally. In this article, I want to look at some of the facts that you need to put into consideration to avoid cyber security threats.   Follow me […]

Loading

cyber crime

Facts About Business Email Compromise Attack

July 2, 2025 Adeniyi Salau 0

  In my previous article, I talked about some of the facts that you need to know about phishing activities in a network security environment. In this article, I will be looking at all that you need to know about Business Email Compromise attack. Follow me as we will look […]

Loading

cyber crime

Role Of Hacktivists In Network Security Threats

July 1, 2025 Adeniyi Salau 0

 People are always at risk of consequence from cyber threats. Some bad actors make use of phishing where people are tricked to enter their details while they think they are on the right website. Some of these are sent through email that looks like original emails.  Hacktivists Hacktivists are groups of […]

Loading

cyber crime

Roles Of Cyber Criminals In Security Threats

July 1, 2025 Adeniyi Salau 0

 A Cyber Criminal belongs to an organized group. They plan to attack devices and steal data. They always threaten to corrupt data so as to throw the entire organization into disarray. In this article, I want to talk about the roles of Cyber Criminals in Security threats. Follow me as […]

Loading

No Image

Roles Of Cyber Warrior In Network Security Threats

July 1, 2025 Adeniyi Salau 0

 A cyber-warrior is a person who engages in cyberwarfare, whether for personal reasons or out of patriotic or religious belief.   Cyberwarfare may be pursued either to defend computer and information systems or to attack them. Cyber-warriors come in different forms, depending on their roles, but all deal with information […]

Loading

cyber crime

Understanding Mobile Security In Network Security

July 1, 2025 Adeniyi Salau 0

  Most of us keep our mobile devices with us throughout the day. We check them frequently. We even keep them at very close range while we sleep because these devices enable access to information anytime and anywhere. Today, they conduct more than half of all internet traffic, and the […]

Loading

cyber crime

How To Handle Cyber Prostitution And Others

July 1, 2025 Adeniyi Salau 0

 First and foremost, there are many unlawful activities that happen online that can compromise the security of your devices. One of such is cyber prostitution and virtual mugging among others. In this article, I want to talk more about how to handle cyber prostitution and secure your network environment. Follow […]

Loading

Common Network Analysis Tool For Cyber Security Analysts

Common Network Analysis Tool For Cyber Security Analysts

October 27, 2023 Adeniyi Salau 0

  A SOC relies on a supporting infrastructure of tools and systems that provide the following services: Network mapping Network monitoring Vulnerability detection Penetration testing Data collection Threat and anomaly detection Data aggregation and correlation   One tool that is used by analysts in a SOC is Security Onion. Security […]

Loading

Initial SQL Slammer Infection

Initial SQL Slammer Infection: How It Is Done

April 26, 2023 Adeniyi Salau 0

Worms share similar characteristics. They all exploit an enabling vulnerability, have a way to propagate themselves, and they all contain a payload. Worm Components Despite the mitigation techniques that have emerged over the years, worms have continued to evolve and pose a persistent threat. Worms have become more sophisticated over […]

Loading

Unknown Facts About Trojan Horses

Trojan Horses: How It Really Works (+Examples)

April 26, 2023 Adeniyi Salau 0

  The term Trojan horse originated from Greek mythology. Greek warriors offered the people of Troy (the Trojans) a giant hollow horse as a gift. The Trojans brought the giant horse into their walled city, unaware that it contained many Greek warriors. At night, after most Trojans were asleep, the […]

Loading

Basic Computer Security Tips To Protect Your Computer

September 28, 2022 Adeniyi Salau 0

The security of the computer allows users to use the computer while keeping safe from threats.   Computer Security can also be defined as managing all components of computer systems that can provide secrecy, credibility, and availability. Data, software, firmware, and hardware are among these components.     Tip 1:  […]

Loading

ITIL 4 Foundation Is All About

What You Need To Know About Home Networks

September 21, 2022 Adeniyi Salau 0

  In my previous article, I talked about all that you need to know about networks. In this article, I want to talk about all that you need to know about Home Networks. Follow me as we are going to look at that together in this article.      What […]

Loading

How Nigerian Scam Yahoo Yahoo Works

How Nigerian Scam Yahoo Yahoo Works

August 24, 2022 Adeniyi Salau 0

  Before I start writing this article, here is a disclaimer. I am not writing this article to rubbish Nigeria as a country and I am not a Yahoo Boy and I will never in my wildest dream support their nefarious activities. I just wanted ordinary Nigerians and all my […]

Loading

Understanding Network Communications Protocols For Cyber Security

Network Communications Protocols For Cyber Security: The Facts

August 18, 2022 Adeniyi Salau 0

Simply having a wired or wireless physical connection between end devices is not enough to enable communication. For communication to occur, devices must know “how” to communicate. Communication, whether face-to-face or over a network, is governed by rules called protocols. These protocols are specific to the type of communication method […]

Loading