April is a special month for me for various reasons. The first is that it is the birthday month of my mom and my childhood bestie. Secondly, it is the Autism awareness month, and thirdly, it hosts the A to Z Challenge for bloggers the world over. A to Z Blogging Challenge Reflection. The A … Continue reading A to Z Challenge Reflection
Image Source: https://www.globaldots.com/resources/blog/zero-trust-explained/ With increased data leaks and data breaches, the traditional way of protecting or securing infrastructure are outdated. Today the IT experts say to trust no one and verify everyone. Thus, zero trust. But what is Zero Trust? When was the first time this term was used? Who coined the term Zero Trust? … Continue reading Z is for Zero Trust
Image source https://www.thetechplatform.com/post/yorick Ok! For this challenge, I am finding programming languages I have never heard of – maybe because I am not from a technical background. So, I know only those languages that are popular in relation to data science and machine learning. However, here is another programing language, I came across starting with … Continue reading Y is for Yorick
Most often than not the world of the Internet, Computers, and Deep Tech have terms starting from letters like X, and Y. So, when I did my research for the terms starting with both X and Y (in the next post), I came across this programing language called XBase++. Image source: https://doc.alaska-software.com/ What is XBase++? … Continue reading X is for XBase++
Whaling or Whale Phishing or Whaling Phishing, call it whatever you may, it is one of the most well-planned attacks on the whales aka the C-suite executives of an organization. The aim behind Whale Phishing is to trick the executives into doing what the Whale attackers want them to do. That could range from money … Continue reading W is for Whaling — An Attack on Whales!
The same confusion about what to choose for V – Virus or Vishing? But then I thought it is better to concentrate on one and to take up the other for some other time. Your computer is infected with a virus, kindly quarantine it. So, here I am with what is that Virus on your … Continue reading V is for Virus — Not Corona but Computer!
Read the URL carefully here. This is an example of URL Spoofing. Image Source: https://www.webopedia.com/definitions/website-spoofing/ I am sure you must have received emails stating offers that are too good to be true, either from your favorite holiday destination, or your aviation company. Yes! What did the offer look like or rather what did it read … Continue reading U is for URL Spoofing!
I am sure not many of us have heard the word. Unless of course, you are a hard-core technical person. Trust me, even Google didn’t understand the word at the first go and gave me options like twitching and swishing. The same was the case with MS Doc. Not much is known about Twishing -- … Continue reading T is for Twishing
Image Source: https://www.dreamstime.com/photos-images/cyber-security.html Cyber security network. Padlock icon and internet technology networking. Businessman protecting data personal information on tablets and virtual interfaces. Data protection privacy concept. GDPR. EU Image Source and Credit: https://www.bridgingminds.net/top-10-reasons-why-ceh-is-essential-in-a-cybersecurity-career/ What comes to your mind when you think about the word security in general and in terms of your online presence? With … Continue reading S is for Security
Image: Aptly describing what Ransomware is. Source: https://securityintelligence.com/ransomware-101-what-is-ransomware-and-how-can-you-protect-your-business/ https://www.zdnet.com/article/fbi-warning-ransomware-gangs-are-going-after-this-lucrative-but-unexpected-target/?ftag=TRE-03-10aaa6b&bhid=%7B%24external_id%7D&mid=%7B%24MESSAGE_ID%7D&cid=%7B%24contact_id%7D&eh=%7B%24CF_emailHash%7D This is the latest Ransomware attack. For a few letters, I have been in dilemma, which one to choose and which one to ignore. In this case, as well, there was confusion – Should I write on Robotics, or should I pick up Ransomware. But then, … Continue reading R is for Ransomware