Browsing category

CYBER SECURITY

Role Of Hacktivists In Network Security Threats

 People are always at risk of consequence from cyber threats. Some bad actors make use of phishing where people are tricked to enter their details while they think they are on the right website. Some of these are sent through email that looks like original emails.  Hacktivists Hacktivists are groups of criminals who unite to carry […]

Roles Of Cyber Warrior In Network Security Threats

 A cyber-warrior is a person who engages in cyberwarfare, whether for personal reasons or out of patriotic or religious belief.   Cyberwarfare may be pursued either to defend computer and information systems or to attack them. Cyber-warriors come in different forms, depending on their roles, but all deal with information security in one form or […]

Social Engineering Attacks In Network Security

  Social engineering attacks is the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.Social engineering attacks happen in one or more steps.   A perpetrator first investigates the intended victim to gather necessary background […]

How To Handle Cyber Prostitution And Others

 First and foremost, there are many unlawful activities that happen online that can compromise the security of your devices. One of such is cyber prostitution and virtual mugging among others. In this article, I want to talk more about how to handle cyber prostitution and secure your network environment. Follow me as we are going […]

Common Network Analysis Tool For Cyber Security Analysts

  A SOC relies on a supporting infrastructure of tools and systems that provide the following services: Network mapping Network monitoring Vulnerability detection Penetration testing Data collection Threat and anomaly detection Data aggregation and correlation   One tool that is used by analysts in a SOC is Security Onion. Security Onion is intended to support […]

Initial SQL Slammer Infection: How It Is Done

Worms share similar characteristics. They all exploit an enabling vulnerability, have a way to propagate themselves, and they all contain a payload. Worm Components Despite the mitigation techniques that have emerged over the years, worms have continued to evolve and pose a persistent threat. Worms have become more sophisticated over time, but they still tend […]

Trojan Horses: How It Really Works (+Examples)

  The term Trojan horse originated from Greek mythology. Greek warriors offered the people of Troy (the Trojans) a giant hollow horse as a gift. The Trojans brought the giant horse into their walled city, unaware that it contained many Greek warriors. At night, after most Trojans were asleep, the warriors burst out of the […]

Blogging As Part Of Online Marketing: What You Need To Know

  It has been mentioned on several occasions that blogging is part of online marketing. Essentially, it is a strategy that is closely linked to many other segments that together make what we know as online marketing, i.e., the promotion of a brand or business using online resources and media. Regardless if you are blogging […]

Basic Computer Security Tips To Protect Your Computer

The security of the computer allows users to use the computer while keeping safe from threats.   Computer Security can also be defined as managing all components of computer systems that can provide secrecy, credibility, and availability. Data, software, firmware, and hardware are among these components.     Tip 1:  Turn on Application Automatic update […]

What You Need To Know About Home Networks

  In my previous article, I talked about all that you need to know about networks. In this article, I want to talk about all that you need to know about Home Networks. Follow me as we are going to look at that together in this article.      What is A Home Network  A […]

How Nigerian Scam Yahoo Yahoo Works

  Before I start writing this article, here is a disclaimer. I am not writing this article to rubbish Nigeria as a country and I am not a Yahoo Boy and I will never in my wildest dream support their nefarious activities. I just wanted ordinary Nigerians and all my esteemed followers outside Nigeria to […]