Last updated on March 9, 2021
Non-Consensual Intimate Images
Last updated on September 20, 2023“Nonconsensual intimate images” refer to suggestive graphic images that are shared without the consent of the person/s who appear therein. Most of the time these are leaked to take revenge or to create a bad …
Your trash is a treasure for someone….
Last updated on August 18, 2023 Trash can be of two forms: physical trash and digital trash. ‘Dumpster diving’ in its simplest meaning is the act of looking through others’ trash to find information that might be useful. The ultimate …
Black Hat, White Hat and Grey Hat
Last updated on August 28, 2023 Who are Hackers and what is the Hat system? Hackers are individuals who have the knowledge and expertise to breach cyber defence systems. In cybersecurity, hackers are classified as per a Hat system which …
Are U being bullied Online?
Last updated on June 19, 2023 What is Cyberbullying? Bullying with the use of digital technologies is known as cyberbullying. This may take place over digital devices like mobile phones, computers and tablets through messaging apps, social media, forums and …
ChatGPT in the limelight
Last updated on June 8, 2023ChatGPT in the limelight What is ChatGPT? ChatGPT is an artificial intelligence (AI) chatbot created by OpenAI for online customer care. This runs on a language model called Generative Pre-trained Transformer (GPT). It is pre-trained …
Software Firewalls
Last updated on April 4, 2023 What is a software firewall? A software firewall is a special computer software that runs on a computer or a server. Its main purpose is to protect the computer or server from outside attempts …
Common IoT attacks
Last updated on April 4, 2023 What is the Internet of Things (IoT)? IoT means a lot of physical devices around the world which are connected to the internet or other communication networks with embedded technologies to collect and transmit …
5G
Last updated on July 20, 2021What would be the next? It is a simple law that when technology becomes more and more advanced the misuse of it and subsequently the security issues also increase. This fact is about technology versus …
Deepfake
Last updated on July 21, 2021As defined by Wikipedia, “Deepfakes are media that take a person in an existing image or video and replace them with someone else’s likeness using artificial neural networks. They often combine and superimpose existing media …
How to tell if an e-mail is a scam
Last updated on October 17, 2022Among the e-mails you receive daily in different forms, it is not easy to identify whether it is a genuine or a scam email. The following indicators will help you to recognize fraudulent e-mails. Incomplete …