Category: Cyber harrassment

  • How to protect the backend of a WordPress website

    How to protect the backend of a WordPress website

    When it comes to how to protect the backend of a WordPress website, every developer has their method. The success of the method depends on the problem the developer wants to avoid. It is crucial to keep our sites safe and the focus should not just be on the hosting panel but also the dashboard…

  • Google Photos and hacking

    Google Photos and hacking

    Today we will be placing a focus on Google Photos and hacking. Did you know that if a hacker manages to access your Google account, they will be able to see your Google photos too and if they happen to be sensitive, then they will be able to misuse the information? If a Google account…

  • QR code phishing attacks

    Hello, today I will be focusing on the magic behind QR codes and phishing links. There is currently an increased number of QR code phishing attacks. There’s always a beauty behind scanning a QR code to access a service. Before you open any QR code, there’s a link behind it. Unfortunately, a few people will…

  • Anonymity tools for people at risk

    Anonymity tools for people at risk

    Everybody can be at risk despite the level of risk. Thanks to technology anonymity tools have been developed to render protection by hiding IP addresses, not storing search histories Lawyers, journalists, media workers, and other human rights defenders, including persons at risk like asylum seekers, refugees, victims of human trafficking, and everybody else should learn…

  • How to install  the tor browser on your computer

    How to install the tor browser on your computer

    Tor browser is one of the most famous anonymity tools used by at-risk groups of people. Anonymity is key for people who may be at risk of being put under surveillance, facing hacking, and a possibility of what they search putting them into trouble. In this article, I will be taking you through the steps…

  • EXPLAINING SYMMETRIC AND ASYMMETRIC ENCRYPTION

    EXPLAINING SYMMETRIC AND ASYMMETRIC ENCRYPTION

    Every organization has one way of encrypting and decripting data, the choice sometimes depends on the flexibility of the encryption method. A bank may choose both asymmetric and symmetric encryption depending on the convenience of the situation. While using the ATM card system, banks use symmetric encryption because it is faster and convenient. Remember so…

  • Money making as a cause for cyber harrassment:blogging

    Money making as a cause for cyber harrassment:blogging

    The era that we are living is an era where money is made from the web. Many people have taken blogging as a source of income and it’s a good thing. It only becomes a problem when it starts having a negative impact on the lives of other people who are online. I made a…

  • Different forms of cyber harrassment

    Different forms of cyber harrassment

    It is hard to know that we are facing or we are being the implementors of cyberharrassment when we don’t even know the types. Back in the day, i didn’t know that i was harrassing someone when i threw a comment on a post in order to attract the attention of other people. All i…

Follow us on Social Media

Enjoy this blog? Please spread the word :)