Ransom Olukotuncyber-ransom.hashnode.net·Feb 19, 2023How to Prevent Phishing AttacksIntroduction Phishing attacks have become a common occurrence since the Internet was introduced in the 1990s. While phishing attacks intrude on victims' private information, people can protect themselves against them with the right knowledge and prep...Discuss·5 likes·35 reads#cybersecurity
Nnadi victoriachiomannadi.hashnode.net·Sep 11, 2022Internet Safe PracticesIntroduction Virtually no restrictions apply to what you can do online. Instant information access, international communication, and many other things are made possible by the Internet. Sadly, online threats like malware, spam, and phishing can also ...Discuss·3 likes·126 readsinternet
Helen Aguhelenagu.hashnode.net·Sep 11, 2022Are You Safe From Phishing Attacks?The three golden rules to ensure computer security are: do not own a computer; do not power it on and do not use it.” – Robert Morris What is Phishing? Phishing is a type of cyber fraud often used to steal user data, including login credentials and c...Discuss·2 likes·48 reads#cybersecurity
NearFormforNearFormnearform.hashnode.net·Mar 31, 2023Stay Ahead of Scammers: A GPT-4-Powered SMS Bot to Keep You Safe from Phishing TextsBy Matt Harrison Editor’s note: This is a cross-post written by Software and Machine Learning Engineer, Matt Harrison. Matt has his own blog. Check it out and you’ll find more great blog posts. Some of the links in this article point to Matt’s person...Discuss·2 likesiwritecode
Kerwintriminator.hashnode.net·Feb 20, 2023WCB #8- Screenshot-based malware targets high value organizations in the U.S and Germany.Weekly Recap From meddling in elections to dangerous "disguised" Google ads, this week in Cyber had an array of engaging stories. Some of these stories include: Elections around the world manipulated by hackers - It has been reported that a unit of ...DiscussWeekly Cyber Briefphishing
Ransom Olukotuncyber-ransom.hashnode.net·Feb 19, 2023How to Prevent Phishing AttacksIntroduction Phishing attacks have become a common occurrence since the Internet was introduced in the 1990s. While phishing attacks intrude on victims' private information, people can protect themselves against them with the right knowledge and prep...Discuss·5 likes·35 reads#cybersecurity
walkingeclipsewalkingeclipse.hashnode.net·Feb 12, 2023You’ve Been FooledSocial Engineering … Social engineering is a form of attack that exploits humans by using manipulative tactics to trick victims into doing what the malicious actor needs to further perform an attack. Humans are inherently trusting in the workforce an...Discuss·28 readsSocial Engineering social engineering
Raymond Fuorrycyberay.hashnode.net·Jan 4, 2023Phishing Scams: How to Recognize and Avoid ThemWhat are phishing scams and how do they work? At its core, a phishing scam is a form of cybercrime in which hackers attempt to trick individuals into giving them sensitive information or access to their accounts. This is typically done through the us...Discuss·154 readsphishing
Evan Ottingerotty.hashnode.net·Dec 15, 2022A Practical Application of dnstwistThe Problem Phishing remains one of the top methods for a malicious actor to gain access to a target environment. A vital component of a realistic phishing campaign is a familiar-looking domain address. Using a technique known as "domain squatting," ...Discuss·396 reads#cybersecurity
Jyotirmoy RoyforJyotirmoy's Blogsitsroy69-blogs.hashnode.net·Nov 10, 2022What Cybersecurity Concerns Should We Look Out For In Web3?Web3 is a new type of web that will completely change the way we interact with the internet. What are some cybersecurity concerns that Web3 will pose to businesses and individuals in the future? What is Web 3.0? The future of the internet is often re...Discuss·2 likes·35 readsWeb3
Ifeanyi Barthcyberbill.hashnode.net·Nov 6, 2022Re-emergence Of Opera1ea Threat Group!Threat group codenamed OPERA1E which seems to have gone underground for some time now resurfaced with a major strike that saw about $11 million stolen from banks and telecommunication service providers in Africa and withdrawn by cash through ATMs. Al...Discuss·28 readsthreat
Shivashish Yadavshiva.hashnode.net·Nov 3, 2022Protect Your Android Phone from Hackers: Common Techniques and Prevention TipsAndroid currently controls 43.06% of the mobile OS market, which is predicted to rise. The open platform of Android and its vast resource library make it simple for developers to design and include new apps. However, the characteristics that make And...DiscussCYBER SECURITYphishing
Shivashish Yadavshiva.hashnode.net·Oct 25, 2022How to Recognize and Protect Against Phishing Emails: Real-World Examples and Reporting TipsPhishing scams and emails can be very harmful. Phishing emails are difficult to recognize, appear genuine, and may have grave repercussions. This article will cover real-world phishing cases, reporting phishing emails, and how to deal with phishing e...DiscussCYBER SECURITYphishing