Posts

Week 11

 https://blog.teamstack.com/mobile-devices-or-computer-which-is-more-secure/#:~:text=While%20this%20may%20sound%20logical,more%20secure%20than%20personal%20computers. I'll briefly explain the differences between computer security and mobile devices security. When sending confidential data, smartphones are more secure than computers. On a computer, if a file is contaminated, the entire system and all other files are at danger, however on a smartphone, you may establish a number of separate user accounts, and if one is infected, others are not. The article continues to provide examples of how smartphones offer a higher level of security than computers.

Week 10

https://terranovasecurity.com/what-is-identity-theft/ Cyber hackers may steal someone's identity in a number of different ways  such as cyberattacks, malware, phishing, and others. In the US, identity theft is a major problem that affects a lot of individuals becoming more easily fooled via apps and emails o r not protecting their passwords for crucial items. Information from businesses, schools, the government, and hospitals is the target of cybercriminals. They attempt to steal enough information about the company or individual to engage in fraud. If you're interested, there are additional instances of how they may utilize your identity throughout the article.

Week 9

http://plaza.ufl.edu/ysmgator/projects/project2/history.html#:~:text=The%20hackers%20were%20not%20even,hackers%20came%20in%20the%201960s. The majority of people are unaware of hacker's past. When did hacking begin, who was the first hacker? I'll go into insight about the history of hackers in this blog. Hacking began in 1878 when a group of youths disconnected or redirected calls. Actually, these were jokers rather than hackers. However, the first hacker to really penetrate a computer was in 1960. MIT students discovered a shortcut to things because they were curious about technology. Dennis Ritchie and Ken Thompson were the first to people to hack programs in computers and called it UNIX.

Week 8

https://hacked.com/miley-cyrus-rihanna-5-worst-celebrity-hacks/ Hackers are able to exploit a large number of people. They hack their computers, phones, or social media accounts. LeBron James, Rihanna, and many more celebrities were among those who suffered hacker attacks. In these instances, the hacker working for LeBron James demanded payment in order to recover their data. While Rihanna's hacker immediately released information and a photo. H ow did they get their information. Some did this through phishing, while others just hacked into their phones to acquire crucial data. The article contains further information regarding who was hacked and how they did it.

Week 7

https://thehackernews.com/2022/08/a-growing-number-of-malware-attacks.html Dark Utility, a service that offered command-and-control (C2) services, attracted 3,000 customers. Founded in 2022, this service promotes "C2-as-a-Service" (C2aaS). offers for a simple €9.99 access to the TOR network, related payloads, and infrastructure housed on the clearnet, with support for Windows, Linux, and Python-based implementations. Dark Utilities enable hackers to swiftly launch attacks against a range of operating systems, lowering the barrier to entry for them within the threat field. You could learn more about Dark Utility through the article provided at the top. 

Week 6

 https://thehackernews.com/2022/08/three-common-mistakes-that-may-sabotage.html There are several mistakes in security training that individuals are unaware of. There isn't a 100 percent effective solution for some errors, including phishing. However, there are techniques to somewhat safeguard oneself from it. People learn how to avoid blunders like installing harmful applications or inputting codes through security awareness training.  Various alternative techniques consist of: Real-life phishing simulations. Adaptive learning - live response and protection from actual cyberattacks. Personalized training based on factors such as department, tenure, and cyber experience level. Empowering and equipping employees with an always-on cybersecurity mindset. Data-driven campaigns These are some trainings that can assist someone in noticing, grasping, and avoid being deceived once more.

Week 5

https://www.itprotoday.com/vulnerabilities-and-threats/70-percent-breached-passwords-still-use According to SpyCloud's annual Identity Exposure report, 70% of passwords that have previously been compromised are still in use. Frequently, the same password is used. Some of these passwords are weak or widely used. These passwords put customers and businesses at risk of fraud or cyberattacks. Choices that represent shared interests are frequently simpler for hackers to decipher. In order to defend themselves from online risks, many businesses and consumers are adopting greater security precautions and enhancing password security.