An Investigation of Crypto jacking: your device can be used for mining on October 17, 2022This is a story from a forensic investigation I did a few days ago so I thought I’d share about a malware in the wild. The user cannot imagine that their device can be used for crypto mining. An IT professional approached me about his machine making noise and running very slow. I asked him […]
Women in Cyber Security on March 9, 2022As women around the world are performing their duties alongside men in various fields, So we talk about the presence of women in the field of cyber security. It has been observed that there are fewer women in the field of cyber security than men. Now the question is why are they fewer? Over the […]
Most common cyber security threats to startups on February 21, 2022Businesses, no matter how little, have to be mindful of and deliberately apply cyber security measures at each level. Your inner forms and your workforce are the final, and one of the foremost critical lines of defense in securing your trade from cyber threats. Given little businesses often need the assets for devoted IT staff, […]
Phishing: the most common cyber attack on April 5, 2019Sending fraudulent messages which appear to come from reputable sources is known as a phishing attack. Just as a fisherman uses bait to catch a fish. This is usually done through email. The goal is to steal sensitive data like credit card and login information, or to install malware on the victim’s machine. Phishing is […]