TECHNOLOGIES
FORUMS
JOBS
BOOKS
EVENTS
INTERVIEWS
Live
MORE
LEARN
Training
CAREER
MEMBERS
VIDEOS
NEWS
BLOGS
Sign Up
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
Cyber Security
FOLLOW
Computer security, also known as cyber security or IT security, is the protection of computer systems from the theft or damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide.
Articles
(48)
Blogs
(13)
Resources
(0)
Videos
(1)
News
(16)
Articles
What is SaaS Security? Why SaaS Security is important in 2025
SaaS Security refers to the measures and protocols designed to protect data, applications, and infrastructures in Software as a Service environments. As businesses increasingly rely on cloud soluti...
Subham Ray
Oct 07, 2024
How DMARC Will Revolutionize Email Authentication in 2025
In 2025, DMARC will be crucial for email security, protecting against phishing and spoofing. It builds on SPF and DKIM protocols to enforce policies and provide reporting. Businesses will increasin...
Subham Ray
Sep 30, 2024
Learn to protect your PC connected with IPv6
Discover essential strategies for safeguarding your PC in an IPv6-connected environment. Learn about common IPv6 threats, best practices for securing your network, and tools to enhance your compute...
Jefferson S. Motta
Aug 02, 2024
The Evolution of Cyber Threats and How to Stay Protected
As cyber threats evolve, from simple viruses to sophisticated ransomware and advanced persistent threats (APTs), staying protected is crucial. Key measures include using strong, unique passwords, e...
Douglas Wagner
Jul 26, 2024
Understanding TLS and SSL: Securing Your Digital Communications
TLS (Transport Layer Security) and its predecessor SSL (Secure Sockets Layer) are cryptographic protocols designed to secure data transmitted over the internet by encrypting and authenticating the ...
Priyanshu Agnihotri
Jul 24, 2024
The Rise of Mobile Malware
The Rise of Mobile Malware" explores the increasing threats to mobile devices from malicious software. As smartphones become central to daily life, they attract cybercriminals targeting person...
Kanishk Kumar
Jul 21, 2024
Threat of public Wi-Fi networks
Public Wi-Fi networks, while convenient, pose significant security risks. These networks are often unsecured, making them vulnerable to cyber threats such as data breaches and man-in-the-middle att...
Kanishk Kumar
Jul 19, 2024
Impact of Quantum Computing on Data Security
Explore the transformative effects of quantum computing on data security in this insightful study. Delve into the potential vulnerabilities posed by quantum algorithms to traditional encryption met...
Douglas Wagner
Jul 17, 2024
How to Perform Basic Nmap Scans
Learn how to perform basic Nmap scans to enhance your network security skills. This guide covers essential Nmap commands, helping you understand how to map networks, identify open ports, and detect...
Punar Dutt Rajput
Jul 10, 2024
Emerging Cybersecurity Threats
Explore the evolving landscape of cybersecurity with a deep dive into emerging threats. From sophisticated ransomware and AI-driven attacks to vulnerabilities in IoT and supply chains, discover how...
Kanishk Kumar
Jun 27, 2024
Biggest Data Breach in India's History
On October 9, 2023, a Dark Web ad revealed a database breach involving Aadhaar numbers, passports, and contact details of 815 million people, originating from ICMR. The breach, linked to a sophisti...
Kanishk Kumar
Jun 24, 2024
Running the Microsoft Windows Malicious Software Remove Tool
The Microsoft Windows Malicious Software Removal Tool (MSRT) helps remove malicious software from Windows systems. It automatically runs monthly via Windows Update, but can also be manually execute...
Jefferson S. Motta
May 24, 2024
ZeroThreat: The Ultimate Web App and API Security Scanning Tool
Identify critical vulnerabilities at 5x speed without any configuration required with world's most intelligent web app & API security scanning platform, ZeroThreat. Avoid pitfalls of 90% ma...
Jigar Shah
Apr 03, 2024
Cyber Defense Using Artificial Intelligence
Cyber Defense involves safeguarding data from unauthorized access through various techniques such as Machine Learning and Deep Learning. The application of Machine Learning using Random Forest clas...
Aishwarya Gupta
Mar 29, 2024
External Streaming Data - Bitstream Format
The main aim of this article is to extend knowledge related to object-oriented programming focusing on interoperability between the computing process and data visualization, archiving, and networki...
Mariusz Postol
Feb 14, 2024
Cybersecurity of External Streaming Data - Non-repudiation
This article which is a continuation of a discussion related to external streaming data will focus on using cybersecurity to protect the confidentiality of bitstreams. It is the third and last part...
Mariusz Postol
Feb 14, 2024
Cybersecurity of External Streaming Data - Integrity
This article delves into cybersecurity considerations for external data, particularly streaming bitstreams. It explores the use of cryptography, focusing on hash functions to ensure the integrity o...
Mariusz Postol
Feb 14, 2024
Cybersecurity of External Streaming Data - Confidentiality
This comprehensive article delves into cybersecurity considerations for external data, focusing on streaming bitstreams. It covers encryption fundamentals, emphasizing symmetric cryptography and pr...
Mariusz Postol
Feb 14, 2024
Google and Yahoo Unveil New Email Authentication Standards
Email remains a cornerstone of communication in the digital age, facilitating interactions between individuals, businesses, and organizations worldwide. However, the ubiquity of email also makes it...
Subham Ray
Jan 29, 2024
🖥️ Incident Handling: Common Malware Attacks
Explore the realm of malware attacks, unveiling the intricacies of threats like ransomware, computer viruses, worms, Trojan horses, and adware. Delve into their types, characteristics, and potentia...
Kuppu Swami
Jan 23, 2024
No Records Available.
View More
Build Progressive Web Apps
Challenge yourself
Tokens Skill
E-Book Download
Get Certified
Web Development Beginner