MALWARE

Ransomware!-stay-safe

Ransomware! Stay safe from it

0
Ransomware: Suppose, like every day, you were working tuk-tuk with your laptop. Suddenly you see a new mail in your mailbox from an organization in the United States. Curious, he...
data-breach

Data Breach! How to protect yourself from the data breach

0
"Data Breach" - You may have heard this term many times. Because it uses many times to cover feature stories in major newspapers or TV channels. But many do not know...
common-computer-virus

10+ Common Types Of Computer Virus in Cyber World

0
Know About Computer Virus A computer virus is a malware affected application or installable code or program. It can come in with your system with infected applications. Such as a document, folder,...
penetration

What is Penetration Testing or Pen Testing in Cyber Security?

0
What is penetration testing? Penetration testing (or pen testing) is a security practice where a cyber-security specialist tries to find and exploit vulnerabilities in a computer system. The purpose of this simulated...
vulnerability-scanning

What is Vulnerability Scanning?

0
Vulnerability scanning or vulnerability assessment is a systematic process of finding security loopholes in any system addressing the potential vulnerabilities. The purpose of vulnerability assessments is to prevent the possibility of unauthorized...

SOFTWARE

Vulnerability