Everything Tech!

Cyber Security

Cross Site Scripting: Let It Not Snoop O...

What is cross-site scripting? Cross-site scripting or XSS attack is very common and unfortunately most of us do not realize. There are different types... Read More

what is cracking and how to identify it

Cracking: How to Safeguard Your System F...

While there’s only a fine line that divides Cracking and Hacking, the former is far more devastating than the latter. Hacking can be done with both ... Read More

what is pharming

What Is Pharming And How To Protect Your...

What is Pharming ? Pharming is a cybercrime in which users are redirected to fake lookalike website of a genuine website. Fake websites contain malici... Read More

computer virus facts

34 Interesting Facts About Computer Viru...

The term ‘Computer virus’ is certainly not new to our ears. It is like a vicious flu that we all want to avoid. Computer virus have been around s... Read More

stay protected from social engineering

How To Safeguard Yourself From Social En...

What is Social Engineering? Social engineering is a technique of attack which is based on human interaction. By using Social engineering, hackers tric... Read More

All About Web Application Attack

All About Web Application Attack...

Web applications have become important over the past decade. Most of the companies use them as they are a low-cost channel to communicate and exchange... Read More

Cyber Security Threats to be aware of

10 Cyber Security Threats in 2019 To Be ...

Internet is a boon for modern generation and businesses, it has transformed everything! Connecting to people across the world has never been this easy... Read More

what is a sniffe

Sniffer: Safeguard Your System From It!...

A sniffer is a program which monitors and analyses network. It detects problems in the network. All the information will then be used by network admin... Read More

what is blueborne attack

What is BlueBorne Attack and How to Stay...

We live in a highly connected world where cyber-attacks have become increasingly common. Attackers take advantage of any vulnerability and targets bot... Read More