Category: Cyber harrassment
-
6 signs of a Facebook hacked account
Most victims of hacking get to realize that their Facebook account was compromised after over a month. During this period, the hacker gains serious control on the Facebook hacked account. At this point, he can make as many changes as possible to personalize the account and make it comfortable enough for him to use it…
-
16 effective ways of fighting phishing
Phishing has become a famously practiced evil in the current day internet. Today I just want to give you and me tips for fighting phishing. Let me begin by defining phishing. Phishing is the practice of sending messages to people while pretending to be from a reputable organization, to obtain personal information for misuse What…
-
7 great tips for WordPress backend protection
When it comes to how to wordpress backend protection, every developer has their method. The success of the method depends on the problem the developer wants to avoid. It is crucial to keep our sites safe and the focus should not just be on the hosting panel but also the dashboard and the file system…
-
3 crazy secrets about Google Photos and hacking
Today we will be placing a focus on Google Photos and hacking. Did you know that if a hacker manages to access your Google account, they will be able to see your Google photos too and if they happen to be sensitive, then they will be able to misuse the information? If a Google account…
-
Diving into QR code phishing attacks
There is currently an increased number of QR code phishing attacks. There’s always a beauty behind scanning a QR code to access a service. Before you open any QR code, there’s a link behind it. Unfortunately, a few people will think that the link behind that win a lottery QR code is a deadly link…
-
Anonymity tools for people at risk
Everybody can be at risk despite the level of risk. Thanks to technology anonymity tools have been developed to render protection by hiding IP addresses, not storing search histories Lawyers, journalists, media workers, and other human rights defenders, including persons at risk like asylum seekers, refugees, victims of human trafficking, and everybody else should learn…
-
6 useful steps for installing The Tor browser on your computer
Tor browser is one of the most famous anonymity tools used by at-risk groups of people. Anonymity is key for people who may be at risk of being put under surveillance, facing hacking, and a possibility of what they search putting them into trouble. In this article, I will be taking you through the steps…
-
Symmetric vs Asymmetric encryption: 2 Definitions
Symmetric vs asymmetric encryption plays a great role in choosing the best type of encryption for data types. Every organization has one way of encrypting and decrypting data, and the choice sometimes depends on the flexibility of the encryption method. A bank may choose both asymmetric and symmetric encryption depending on the convenience of the…
-
Money making as a cause for cyber harrassment:blogging
The era that we are living is an era where money is made from the web. Many people have taken blogging as a source of income and it’s a good thing. It only becomes a problem when it starts having a negative impact on the lives of other people who are online. I made a…
-
7 horrible forms of cyber harassment
Cyber harassment is one most common types of harassment in the present day. It is hard to know whether we are facing or we are being the implementors of cyberharassment when we don’t even know the types. Back in the day, I didn’t know that I was harassing someone when I threw a comment on…