SecurityCyber Security and its future challengesJune 25, 20192 CommentsCyber Security refers to the methods that ensure the safety and authenticity of data in the online world. The core…
SecurityNotPetya Technical AnalysisJuly 3, 20170NotPetya Technical Analysis NotPetya (or “Nyetna” as it has also been named) spreads to other systems on the network without…
SecurityPetwrap Ransomware AnalysisJune 28, 20170Petwrap Ransomware Analysis Petwrap ransomware or Petya/NotPetya, is the recent new ransomware affecting computer networks. On the morning of June…
SecurityWannaCry Ransomware AnalysisJune 28, 20170WannaCry Ransomware Analysis WannaCry ransomware has been the most widespread ransomware. A ransomware is a type of malicious software designed…
Information TechnologyA cyber war is deadlier than a nuclear war. Part 1August 10, 201527 CommentsWhy do we tend to live in a misconception that our data is protected? Why do we tend to believe…
LegalLEGAL ISSUES IN CYBERSPACEJuly 1, 201527 CommentsThe cyber space has been the greatest example of the human advancement with all the world, services and products available…
Information TechnologySecurityHow secure is your Web Login?March 22, 201514 CommentsAhh i’m safe i have a difficult password for all my accounts! no one will dare crack it! Well this…
Information TechnologyIs your computer secure? (Windows OS only)March 20, 201510 CommentsDoes keeping login passwords make your computer secure? Well, it doesn’t. There are many ways by which even the login…
MediaIntroduction to cryptographyOctober 15, 20147 CommentsCryptography is the science and art of hiding the meaning of a communication from unintended recipients. It encrypt the data…