VPN: You may not be as secure as you think you are

VPN: You may not be as secure as you think you are

VPN: You may not be as secure as you think you are Post Views: 1,171 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 2 Minutes Using a VPN is not 100% Secure. The reason is simple, still, security researchers, hackers, submit bug bounties,...
Fact: There is no minimum threat in     Cyber Security

Fact: There is no minimum threat in Cyber Security

Fact: There is no minimum threat in Cyber Security It goes back to the root of the problem. In today’s world, attacks will continue to happen, and exploits will continue to be found. A threat on the offensive side of Cyber Security, once found it cannot be...
Fact: There is no Operating System that is 100% Secure

Fact: There is no Operating System that is 100% Secure

Fact: There is no Operating System that is 100% Secure There is no operating system that is 100% secure, based on 2019 stats, Android, Windows, IOS, OSX were the top used operating systems. So when hackers work with payloads, also known as “Viruses, Worms...
Fact: HTTPS: A Secure Connection does not mean a secure Website

Fact: HTTPS: A Secure Connection does not mean a secure Website

Fact: HTTPS: A Secure Connection does not mean a secure Website A Implementing HTTPS on your website, is a required step to do, but when you see the Secure Symbol next to the browser, it does not guarantee a website is safe from all threats. A Phishing Site, can also...
Fact: It does not matter how you create your Password

Fact: It does not matter how you create your Password

Fact: It does not matter how you create your Password Whether its a complicated one or not it gets encrypted into a hash. There are techniques besides bruteforce, to let you dump the hash and sometimes in plain text like man in the middle attacks, Rogue Access Points,...
Fact: Nothing Gets Deleted

Fact: Nothing Gets Deleted

Fact: Nothing Gets Deleted When you delete a file, even after emptying the recycle bin, it orders your OS to make it look like its deleted by removing the knowledge of where it is. With data, you can only rewrite on top of what is there, replacing the old data with...