cybersecurity
Our personal, digital, national and military security depend on a safe cyber space.
The Colonial Pipeline Hack Timeline and How Ransom Funds were Seized
The Colonial Pipeline Hack On May 7, 2021 Colonial Pipeline Company had its systems hacked. Essentially, they went offline, waited for an arguably long time to contact federal agencies, and released a public statement that they were the victims of ransomware by bad actors from Darkside (members of a cybercriminal group). Ransomware is when a company’s digital property is encrypted (made unreadable) until a monetary demand is met. BTC (Bitcoin) is a cryptocurrency, or digital currency. It’s very popular with ransomware attacks because it can be very difficult to trace. Over the next two days they slowly began searching the nearby grounds and turning on the smaller systems. By Wednesday May 12, 2021 Colonial Pipeline Company was back up and running with pipeline ops.
By Brandy Enn5 years ago in 01
How To Change Your IP Address To Troubleshoot Your Internet Connection Or Protect Your Privacy
All the devices which are connected with the internet have an IP (Internet Protocol) address, and it is a series of numbers which interspersed with the decimal numbers as like “198.170.0.110,” and this number of series acts as the home address of your computer by which other devices can easily find your computer.It is sporadic to find the IP address of your computer, but you must find it, and it is straightforward to find the IP address of your computer.
By Alessia Martine5 years ago in 01
How to Stay Cyber-Safe While Working From Home
Ever since the global pandemic took the world by a deadly storm, working from home has become the new normal. In the beginning, we all struggled to adjust to this new work model. It was hard to focus on work because of greater distractions at home. The fear of COVID-19 and the safety concern had been hovering over our heads. Almost everyone was worried regarding their job security.
By Rizwan Ahmad5 years ago in 01
Social Media Profiles| Defining a New Search Engine
Google searches provide greats results, DuckDuckgo is a good alternative Bing also does wonders but, if you’re profiling someone nothing is better than finding that person’s online profile or profiles in this case. For the purpose of this post I’ll only use a few Social Media platforms but you’re free to explore as many as you need.
By Sam Writes Security5 years ago in 01
Some thoughts on free and paid antivirus and firewall applications
Downloading and running an antivirus and firewall program is absolutely necessary Let’s face it. Running a robust antivirus and firewall program on your computer or mobile device is more than necessary.
By thepavsalford5 years ago in 01
This Page Reveals What Google Knows About You - And How To Delete The Data
A post on the video platform TikTok recently went viral in which a user shows how much Google actually knows about the user - depending on usage behavior, the information collected can be quite extensive.
By Ghani Mengal5 years ago in 01
Theory Of No Hope: Go Offline
When we search for ways to protect ourselves and data online we get a number of results most of which provide very informative how-to guides that we can follow. But, what if we didn’t have to do all there is to protect ourselves online, what if we could live without passwords? What if we could live without a VPN, what if we didn’t need a password manager?
By Sam Writes Security5 years ago in 01
Internet Security | A Guide To Safer Browsing
We’re constantly hiding day, and night. We hide in the name of security, privacy and safer browsing. When we connect our devices to the internet we share our IP address (Internet Protocol) every device that connects to the internet has an IP address this is how devices are identified online, this is also one of the ways you can identity who might be behind such a device. Well, maybe not you but believe me someone can. So, let’s talk about it.
By Sam Writes Security5 years ago in 01
Meet Your Online Identity: Internet Protocol (IP)
IP is short for internet protocol, this is how we know that you shop online and watch all kinds of videos on YouTube. So how do we know what you do online exactly? Let's start with what helps us figure out what you do then we’ll talk about how we figure this out how’s that?
By Sam Writes Security5 years ago in 01






