Be Aware! Your witless acts can cause you a life’s threat. Plugging your phones to public charging stations or computers at railways stations, bus stands etc. using USB cables makes your phone vulnerable to hackers. Not even every USB cable in the market is genuine and poses the possibility of data theft while charging. USB
In case of a malware attack or forgetting your android smartphone password, the thought which strikes our mind is of a factory reset. With this we get rid of the above annoying situations but it also eliminates all our installed applications from our phone and we need to start the entire procedure again installing
IoT Device and Hack This recent increase in IoT devices have proved mindboggling challenge to cyber world. No doubt IoT devices has significantly eased our life. The smart refrigerator tells you when the milk is over, available veggies. Adding to this here are some of the noteworthy IoT devices. August doorbell camp: this small doorbell
Illegal access The term “hack” was first used by US university computing centre in mid-1960. The offence of illegally accessing the system. There are two terms for illegal attempt to get into the system hacking and cracking. Hackers are people who get into the system and exploit the system for purpose. Breaking the password, setting
Cyber Crime and Cyber Security! Cybercrime and cyber security is the trending topic which is all over the internet. Cybercrime and cyber security go hand in hand. Cybercrime are the criminal activity carried by means of computer, other electronic devices and internet. Cyber security is the protection from cybercrime in cyber space. Cyber security has
A short analysis of Ransomware in reference to Ohio ransomware attack “Ransomware is more about manipulating vulnerabilities in human psychology than the adversary’s technological sophistication” As the world is becoming more techno savvy so are the crimes associated with it. Last year’s top most cyber security threat as reported by Malwarebytes labs. Ransomware is kidnapping
“Mobile Malware from Timfonica to Triada” Malicious software that are targeted for mobile phones and personal digital devices was firstly introduced by Marcos Velasco (Brazilian software engineer) to aware the masses about the upcoming threat.However, Timifonica being the early form of mobile malware orginated by Spain and diagnosed by Russian labs has its fame competence
by Arfiya Siddique “Replace cyber-bullying with cyber-believing. Let us build each other up instead of bringing others down. BELIEVE & BUILD” ― Janna Cachola Cyberbullying or Online Bullying is the use of technology to harass, threaten, embarrass a target person by another individual or a group by the use of internet and digital devices.
CLOUD FORENSICS AND IT’s CHALLENGES Major companies and also traditional vendors are using cloud services since cloud services provide broader horizon of services to the clients. Cloud computing offers diverse benefits such as scalability, flexibility and readily available services. Flexibility benefit refers to the ability of using the computer resources you need when you need
Hi Readers, Thanks for your over whelming support for the inaugural issue of Digital 4n6 Journal.We have come out with the second issue after incorporating all the suggestions given by you. We have given a new look and also changed the size of the Journal and now we can proudly say it is second to