Lawrence Juma "Jumalaw98"jumalaw98.hashnode.dev·Oct 19, 2024Day 19: Don’t Be Fooled!“If it sounds too good to be true, it probably is.” Imagine getting an email informing you that you've won a complimentary Bahamas cruise! All you need to do is click a link and provide your details. Take a moment to gather your belongings before yo...DiscussCybersecurity Awareness 2024: Securing Our Worldsocial engineering
Indu Jawlacoders.hashnode.dev·Oct 14, 2024Types of Ethical Hacking: Choose yoursWeb Application Hacking: SQL InjectionSQL Injection is one of the most common web application vulnerabilities, where an attacker can manipulate the backend database by injecting malicious SQL queries through user input fields. Consider a scenario whe...Discuss#wirelesshacking
Ayanconnectedrhythms.hashnode.dev·Oct 4, 2024How a Fingerprint Scanner Works: Understanding the Technology Behind Biometric SecurityFingerprint scanners have become a ubiquitous part of modern security systems, providing a convenient, reliable, and secure way to authenticate users. From unlocking smartphones to verifying identity at workplaces, airports, and banking systems, fing...Discuss·1 likeComputer Science
Ayanconnectedrhythms.hashnode.dev·Oct 3, 2024"Round Lens, Square Shot: Why Phone Cameras Capture Rectangular Images"When you look at the back of your smartphone, you'll often notice a small, circular lens housing the camera. Yet, when you take a picture, the resulting image is rectangular. This raises an interesting question: why do phone cameras have circular len...DiscussLife lessons
Oluwadamilola Bamigbosedamibamigbose.hashnode.dev·Sep 17, 2024Social Engineering: A Lesson on PhishingSocial engineering refers to a broad range of security threats that exploit human interaction to achieve malicious goals. One of the most prevalent, effective and dangerous forms of social engineering is phishing. Phishing involves tricking individua...Discuss#PhishingAttacks
Jasai Hansdajasaiblogs.hashnode.dev·Aug 5, 2024Cybersecurity in the Age of Gaming: Lessons from Watch DogsIn recent years, video games have evolved into immersive narratives, blurring the lines between fiction and reality. Among these, the Watch Dogs series stands out as a gripping portrayal of hacking and cybersecurity. Set in a world dominated by techn...Discussgaming
FIKARA BILALblog.fikara.io·Apr 15, 2024The gaining access phaseThe Gaining Access phase in penetration testing represents a pivotal point where ethical hackers try to penetrate a target system's defenses. This article will explore the complexities of this phase, examining the techniques, tools, and best practice...Discuss·44 reads#cybersecurity
The Watcherthewatcher.xyz·Apr 4, 2024Phishing attack imitates US Department of LaborIn January 2022, an advanced phishing scheme was reported aimed at obtaining Office 365 credentials by impersonating the US Department of Labor. This incident highlights the increasing sophistication of phishing efforts. The attack used two methods t...DiscussSocial Engineeringsocial engineering
The Watcherthewatcher.xyz·Apr 3, 2024Google Drive Notification Trap: A New Twist on PhishingIn 2020, a new scam appeared that misused Google Drive's notification feature. Scammers would create a document with harmful links, then invite their target to work on the document. When invited, the target got a real email from Google, making the sc...DiscussSocial Engineeringsocial engineering
The Watcherthewatcher.xyz·Apr 1, 2024Phishing Using Fake LinksApril 2021 saw yet another phishing attack emerge that appears specifically designed to target remote workers using cloud-based software. The attack begins when the target receives an email—written in the urgent tone favored by phishing scammers—requ...DiscussSocial Engineeringsocial engineering