Mbaoma chukwuemekaforMy cybersecurity journeymbaoma.hashnode.dev·8 hours agoCybersecurity Awareness Month: Day 4Overview of Cyber Attacks (Highlight common attacks like DDoS, brute force, etc.) Welcome to Day 4 of Cybersecurity Awareness Month. Today, we’re diving into cyber attacks, examples, and prevention. Cyber attacks are deliberate attempts by malicious ...Discuss·20 likes#cybersecurity
Mbaoma chukwuemekaforMy cybersecurity journeymbaoma.hashnode.dev·Nov 16, 2024Cybersecurity Awareness Month: Day 1Introduction to Cybersecurity Awareness Month Welcome to Day 1 of my 15-Day Cybersecurity Awareness Month! The main reason for me embarking on this join is to educate the public about security awareness, types of attacks, and prevention. Over the nex...Discuss·21 likes·31 reads#cybersecurity
Ahmed Razaahmedrazadev.hashnode.dev·Nov 14, 2024DDoS and DoS Attacks: Prevention and Notable CyberattacksIn the ever-evolving landscape of cybersecurity, Distributed Denial of Service (DDoS) and Denial of Service (DoS) attacks have become some of the most prominent threats to businesses and individuals alike. These cyberattacks target the availability o...Discussddos attacks
Yuva Shankar Narayana Dhaipullayysnwrites.hashnode.dev·Oct 31, 2024Modern Cybersecurity Threatswhat is the role of cybersecurity in this world ! As the internet is growing and it is more accessible to people , people use internet for both good and bad. As a coin has two sides internet has two sides too , where these bad guys pursue malpractice...Discuss·11 likescybersecurity
Crypt(iq)iqmacodes.hashnode.dev·Oct 26, 2024How do Your Passwords get hacked?Password attacks are one of the most popular ways people get their information and data compromised, and most cyberattacks are focused on obtaining the user's passwords. This article explains how your passwords get compromised, the different ways in ...Discuss·15 likes·76 readsCybersecurity#cybersecurity
Lawrence Juma "Jumalaw98"jumalaw98.hashnode.dev·Oct 25, 2024Day 26: Is This Real?Ever wonder if that “celebrity cooking a gourmet meal” video you saw was real or just some digital magic? Well, you’re not alone! Today, we’re diving into deepfakes—a fun tech word for a not-so-fun security risk. Because, hey, it’s 2024, and it seems...DiscussCybersecurity Awareness 2024: Securing Our WorldCybersecurityAwareness
Lawrence Juma "Jumalaw98"jumalaw98.hashnode.dev·Oct 24, 2024Day 25: Let’s Make the Internet a Safe Space for AllEver feel like your online experience is interrupted by a random "keyboard warrior"? Cyberbullying has become a significant concern in our digital age, but there are ways to handle it without letting the trolls ruin your day! Today, we’re talking abo...DiscussCybersecurity Awareness 2024: Securing Our WorldOnline Harassment
Victor Uzoagbacyberfriend.hashnode.dev·Oct 23, 2024Zero Trust Architecture: Advantages and Challenges in ImplementationIntroduction As changes are taking place regarding the digital platform, conventional security models cannot cope with the threats that prevail today. Perimeter-based security relies primarily on the proposition that threats from outside an organizat...Discusssecurityawareness
Lawrence Juma "Jumalaw98"jumalaw98.hashnode.dev·Oct 21, 2024Day 22: Keeping Your Secrets SafeImagine sharing a private message with a friend, only to discover that others can see it, too. It's not so private anymore, right? Today's topic concerns secure messaging apps—apps designed to protect your messages from prying eyes. Whether you're a ...DiscussCybersecurity Awareness 2024: Securing Our WorldSecure messaging
Jennifer Yesufubyte-by-byte.hashnode.dev·Oct 21, 2024The Growing Importance of Cybersecurity Documentation in Today’s Digital WorldAs technology advances, so do the threats that come with it. Cybersecurity is no longer just an IT issue—it’s a business-critical concern for organizations across the globe. With cyber-attacks becoming more sophisticated and frequent, strong cybersec...Discuss·1 like#cybersecurity