Nguyen Thi Thaoharrypage.hashnode.dev·Nov 21, 2024How a Hacker Could Exploit Canvas FingerprintingCanvas fingerprinting is a tracking technique where a unique identifier is generated based on the graphics rendering capabilities of a user's device, particularly the <canvas> element in HTML. The process involves using the <canvas> element to render...19 likescanvas
Bindhu Gandrabindhugandra.hashnode.dev·Nov 17, 2024Phishing link and URL Checker using Machine LearningIntroduction In today’s digital world, phishing has become one of the most frequent and serious types of cybercrime. These scams trick people into sharing personal information by pretending to be trustworthy websites or emails. With the rise in onlin...capstone project
Nam Anh Mai D.forFIS Securityblog.fiscybersec.com·Nov 12, 2024Chiến dịch lừa đảo nhắm vào các doanh nghiệp sử dụng OpenAI và ChatGPTVừa qua, phía Barracuda Networks thông báo rằng một chiến dịch tấn công lớn với phạm vi toàn cầu của tin tặc đang nhắm tới các doanh nghiệp và người dùng sử dụng dịch vụ của OpenAI thông qua các tài khoản ChatGPT. Cụ thể, các tin tặc đã cố gắng mạo d...Newslettersthreat intelligence
aniesaaniesa.hashnode.dev·Nov 2, 2024Key Tactics to Enhance Online Security and Prevent PhishingPhishing has become one of the most prevalent online scams today, luring unsuspecting users into sharing personal and sensitive information. These attacks have evolved over the years, growing more sophisticated and varied, making them harder to detec...#PhishingAttacks
Lawrence Juma "Jumalaw98"jumalaw98.hashnode.dev·Oct 19, 2024Day 19: Don’t Be Fooled!“If it sounds too good to be true, it probably is.” Imagine getting an email informing you that you've won a complimentary Bahamas cruise! All you need to do is click a link and provide your details. Take a moment to gather your belongings before yo...Cybersecurity Awareness 2024: Securing Our Worldsocial engineering
Shruti RajeshforZySec AIblog.zysec.ai·Oct 14, 2024Emerging AI-Powered Solutions to Counter Advanced Phishing AttacksPicture this: You're peacefully drinking your morning coffee, when bam! Your inbox is flooded with emails promising everything from miracle weight loss pills to inheritances from long-lost royals. But fear not, because AI is here, like a superhero in...news
Indu Jawlacoders.hashnode.dev·Oct 14, 2024In-Depth Exploration of Cybersecurity ConceptsThe CIA Triad: Confidentiality, Integrity, Availability 1. Confidentiality Definition: Confidentiality ensures that sensitive information is accessible only to those authorized to have access. It is fundamental in preventing unauthorized disclosure o...#cybersecurity
Oluwadamilola Bamigbosedamibamigbose.hashnode.dev·Sep 17, 2024Social Engineering: A Lesson on PhishingSocial engineering refers to a broad range of security threats that exploit human interaction to achieve malicious goals. One of the most prevalent, effective and dangerous forms of social engineering is phishing. Phishing involves tricking individua...#PhishingAttacks
FIKARA BILALblog.fikara.io·Aug 27, 2024Password Security: Best Practices and ManagementProtecting your online information is crucial to avoid disastrous consequences. No one is immune to identity theft, loss or leakage of personal or financial data, or unauthorized access. One way to reduce the risk is to ensure a certain level of pass...Security
FIKARA BILALblog.fikara.io·Aug 27, 2024La Sécurité des Mots de Passe : Bonnes Pratiques et GestionProtéger ses informations en ligne est crucial pour éviter des conséquences désastreuses. Personne n'est à l'abri d'un vol d'identité, d'une perte ou fuite de données personnelles ou financières, ou encore d'accès non autorisé. Un moyen de diminuer l...46 readsSecurity