Last updated on March 9, 2021

See how you acted in cyberspace! (Digital Footprint)

Last updated on October 20, 2023

Non-Consensual Intimate Images

Last updated on September 20, 2023“Nonconsensual intimate images” refer to suggestive graphic images that are shared without the consent of the person/s who appear therein. Most of the time these are leaked to take revenge or to create a bad …

Your trash is a treasure for someone….

Last updated on August 18, 2023 Trash can be of two forms: physical trash and digital trash. ‘Dumpster diving’ in its simplest meaning is the act of looking through others’ trash to find information that might be useful. The ultimate …

Black Hat, White Hat and Grey Hat

Last updated on August 28, 2023 Who are Hackers and what is the Hat system? Hackers are individuals who have the knowledge and expertise to breach cyber defence systems. In cybersecurity, hackers are classified as per a Hat system which …

Are U being bullied Online?

Last updated on June 19, 2023 What is Cyberbullying? Bullying with the use of digital technologies is known as cyberbullying. This may take place over digital devices like mobile phones, computers and tablets through messaging apps, social media, forums and …

ChatGPT in the limelight

Last updated on June 8, 2023ChatGPT in the limelight What is ChatGPT? ChatGPT is an artificial intelligence (AI) chatbot created by OpenAI for online customer care. This runs on a language model called Generative Pre-trained Transformer (GPT). It is pre-trained …

Software Firewalls

Last updated on April 4, 2023 What is a software firewall?  A software firewall is a special computer software that runs on a computer or a server. Its main purpose is to protect the computer or server from outside attempts …

Common IoT attacks

Last updated on April 4, 2023 What is the Internet of Things (IoT)? IoT means a lot of physical devices around the world which are connected to the internet or other communication networks with embedded technologies to collect and transmit …


Last updated on March 30, 2023

Business Email Compromise (BEC)

Last updated on December 12, 2022

Why you should know about Steganography

Last updated on October 14, 2022

Can a QR code be dangerous?

Last updated on July 5, 2022

How to Factory reset several devices

Last updated on September 5, 2022


Last updated on June 7, 2022

Is factory resetting important?

Last updated on June 23, 2022

Deep web and Dark Web

Last updated on April 21, 2022


Last updated on January 20, 2022

16 common crypto scams to keep an eye out for – PART -2

Last updated on October 19, 2021

16 common crypto scams to keep an eye out for PART -1

Last updated on October 19, 2021

What is a cryptocurrency scam?

Last updated on June 30, 2023


Last updated on October 13, 2021

Zoom app security settings

Last updated on June 11, 2021

Are you caught up in the reset of on-line education?

Last updated on August 14, 2021


Last updated on July 20, 2021What would be the next? It is a simple law that when technology becomes more and more advanced the misuse of it and subsequently the security issues also increase. This fact is about technology versus …


Last updated on July 21, 2021As defined by Wikipedia, “Deepfakes are media that take a person in an existing image or video and replace them with someone else’s likeness using artificial neural networks. They often combine and superimpose existing media …

Spam vs. Scam

Last updated on November 22, 2022

What is Two-Factor Authentication?

Last updated on August 14, 2021

Social Engineering

Last updated on August 15, 2021

What are scams

Last updated on March 5, 2021

How to tell if an e-mail is a scam

Last updated on October 17, 2022Among the e-mails you receive daily in different forms, it is not easy to identify whether it is a genuine or a scam email. The following indicators will help you to recognize fraudulent e-mails. Incomplete …