Supriya Nil
-
CYBER SECURITY
Footprinting concepts in Ethical Hacking
Introduction Footprinting is an ethical hacking technique to gather information about the target company, IP address, and network. Footprinting that…
Read More » -
Cryptocurrency
Is possible to recover cryptocurrency from scammers ?
Cryptocurrencies are notoriously hard to recover from scammers, but there are ways you can get your money back if a…
Read More » -
Interview
Interview with Shrutirupa Banerjiee
Shrutirupa is an experienced Security Enthusiast with over 4 years of demonstrated skills in Penetration Testing and Vulnerability Assessment of…
Read More » -
CYBER SECURITY
How to become a professional hacker ?
Introduction Hackers are the people who develop and use computer programs to gain unauthorized access to a computer system, data,…
Read More » -
CYBER SECURITY
What is Top information security attacks vector ?
Phishing/social engineering Social engineering is a type of hacking that uses human interaction to gain access to a network. Phishing…
Read More » -
CYBER SECURITY
86,400 attacks on Microsoft’s Windows Server per day
Microsoft has reported that their windows software faces at least one attack per second. It means that 365 days per…
Read More » -
Interview
Interview with UMADEVI YANDAMURI.
Image Source- PNG TREE UMADEVI is the founder of CYBER WOLVERINE. She has expertise in various fields like Web Application…
Read More »