Mbaoma chukwuemekacybersecurityawareness.hashnode.dev·Nov 23, 2024Cybersecurity Awareness Month: Day8Safe Browsing Practices In today's connected world, browsing the internet has become second nature. However, navigating the web comes with risks like malicious websites and harmful downloads. These threats can compromise your data, infect your device...Discuss·20 likes#cybersecurity
David G. SimmonsforEdgeIoTedgeiot.hashnode.dev·Nov 22, 2024How to integrate a LoRA module with a Zymbit Secure Edge NodeThis How To Guide will show you how to integrate a LoRaWAN card with a Zymbit Secure Edge Node (SEN) Developer Kit. The Goals is to be able to get your Zymbit Secure Edge Node Developer Kit to come up as a LoRaWAN packet forwarder and connect to The ...Discussiot
Mbaoma chukwuemekaforMy cybersecurity journeymbaoma.hashnode.dev·Nov 22, 2024Day 7: Quiz or Interactive Recap.Cybersecurity Awareness Quiz Multiple-Choice Questions Which of the following is NOT a type of malware? A) Ransomware B) Trojan C) Firewall D) Spyware Correct Answer: C) Firewall What does phishing aim to steal from victims? A) Hardware B)...Discuss·10 likes#cybersecurity
Mbaoma chukwuemekaforMy cybersecurity journeymbaoma.hashnode.dev·Nov 21, 2024Cybersecurity Awareness Month Day 6:The Evolution of Cyber Threats Introduction Cyber threats have evolved dramatically over the years. From simple pranks and experimental viruses to sophisticated ransomware and nation-state-sponsored cyberattacks, the nature of these threats has grown...Discuss·10 likes#cybersecurity
Mbaoma chukwuemekaforMy cybersecurity journeymbaoma.hashnode.dev·Nov 20, 2024Cybersecurity Awareness Month Day 5: Case Studies And Real Life Examples of Attacks and Their ConsequencesCyberattacks are not just abstract threats they are real, costly, and can have far reaching consequences. To highlight the importance of cybersecurity, let us examine some notable real world cases and the lessons they offer. 1. WannaCry Ransomware At...Discuss·20 likes#cybersecurity
Mbaoma chukwuemekaforMy cybersecurity journeymbaoma.hashnode.dev·Nov 18, 2024Cybersecurity Awareness Month: Day 3What is Malware, Types and Their Effects What Is Malware? In today’s digital world, malware has become a significant threat to personal devices, businesses, and national security. Short for "malicious software," malware refers to programs designed to...Discuss·20 likesC#
David G. SimmonsforEdgeIoTedgeiot.hashnode.dev·Nov 18, 2024Integrating an LTE Cell Modem with Zymbit Secure Edge NodeThis How To Guide will show you how to integrate an LTE Cell Modem card with a Zymbit Secure Edge Node Developer Kit. The Goals is to be able to get your Zymbit Secure Edge Node Developer Kit to come up with an alternative data path provided by the L...Discuss·69 readsRaspberry Pi
Rao Waqas Akramraowaqasakram.hashnode.dev·Nov 15, 2024Ensuring Strong Password PracticesIn today's interconnected digital world, password security remains a cornerstone of safeguarding sensitive information. Despite awareness campaigns, many users continue to reuse the same password across multiple platforms. This behavior introduces a ...Discuss·35 readsdata breach protection
Sergio Medeirosgrumpz.net·Nov 10, 2024My Journey to Passing the CAPenX Certification: A Guide for Aspiring Expert-Level AppSec PentestersIntroduction: As a seasoned cybersecurity researcher and penetration tester, I am constantly on the lookout for certifications that sharpen my skills and keep me at the forefront of web application security. The Certified AppSec Pentesting Expert (CA...Discuss·10 likes·85 readssoftware development
HOT HEADhothead01th.hashnode.dev·Nov 2, 2024Understanding the Malicious Use of OAuth ApplicationsThe Comprehensive Guide to Malicious Use of OAuth Applications: Understanding Parameters, Charts, and Case Studies OAuth (Open Authorization) is essential in today's interconnected digital landscape, facilitating secure access to user data across var...Discussmalicious