Last updated on July 20, 2023
Black Hat, White Hat and Grey Hat
Who are Hackers and what is the Hat system?
Hackers are individuals who have the knowledge and expertise to breach cyber defence systems.
In cybersecurity, hackers are classified as per a Hat system which came from old cowboy film culture where the good characters usually wore white hats and the bad characters wore black hats.
The Ultimate List of Remote Work Security Tips 
1) Stay savvy about cybersecurity risks
2) Use your company’s data protection plan
3) Use an antivirus solution
4) Enable Multi-Factor Authentication (MFA)
5) Use a Virtual Private Network (VPN)
6) Use a cloud service
7) Properly configure the cloud service
8) Secure your webcam
9) Protect your home Wi-Fi network
10) Be cautious when working on public Wi-Fi
11) Make your Zoom meetings safer
12) Secure your passwords
13) Protect your online bank accounts
14) Prevent email phishing
15) Keep your software up-to-date
16) Separate work from private life
17) Keep family members away from work devices
Vulnerability in Fortinet FortiNAC
A remote code execution vulnerability was identified in Fortinet FortiNAC.
Critical Vulnerability in Medtronic Paceart Optima System
The Critical vulnerability could allow an unauthenticated user to perform remote code execution or create a DoS condition.
DoS and DDoS Attacks against Multiple Sectors
CISA is aware of open-source reporting of targeted denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks against multiple organizations in multiple sectors.
A proper mechanism to regulate local and foreign businesses conducted via Internet is essential
The need to create a common business environment for local companies and international companies engaged in business activities centered on the Internet was emphasized here.
Twitter’s future is in doubt as Threads tops 100 million users
The launch of a rival app from Meta could prove to be the final straw.
Onmax DT directors have Rs.790 Mn in their accounts – CID
The CID said that they publicised that a person who invested the maximum package in this pyramid scheme can get more than USD 50 per day in returns or dividends.
The rise in cyber extortion attacks and its impact on business security
Charl van der Walt, Head of Security Research at Orange Cyberdefense, discusses cyber extortion attacks and their expansion to new regions.
The Resiliency Initiative got invited to participate in Digital Rights Asia-Pacific 2023
Recognizing Hithawathi across Asia to tackle intolerance and promote peace through social media.
Seven similar faces and her agony
Thilini was doing a part time job while studying. She was very good at baking so her part time job was making cupcakes. Thilini even had a Facebook page to promote her small business. She used to take various pictures from her phone of the cakes she made and used them in promoting her page. Her page had a good number of Followers and she was a bit famous around her town.
Introduction to ICT industry & awareness on Cybersafety
AT PASSARA CENTRAL COLLEGE
An introduction to ICT industry along with awareness about identifying and mitigating Cyber Harassments was held on 13th July 2023 at Passara Central College. This was conducted by Hithawathi in collaboration with Axiata Digital Labs (ADL). Advanced Level students, teachers and principals of schools in that area and representatives from Zonal educational office participated in this event.
Tobor the Great (1954)
This science fiction film tells the story of a young boy, his grandfather, and his best friend — who just so happens to be a robot — as they work together to stay safe from the group of communist agents on their tail.
Neopixel Ring Shield for Nicla Sense Me
Light up your wearables with this Nicla Sense Me LED shield!