Category: Uncategorized

  • Types of phishing attacks

    The type of phishing attack is always determined by the motive behind the phishing attack and who the phishing attack is being launched on. What does the attacker want to achieve? Who is he launching the phishing attack on? Is the person an executive director of a large famous entity, is the campaign meant to…

  • QR code phishing attacks

    Hello, today I will be focusing on the magic behind QR codes and phishing links. There is currently an increased number of QR code phishing attacks. There’s always a beauty behind scanning a QR code to access a service. Before you open any QR code, there’s a link behind it. Unfortunately, a few people will…

  • STEPS FOR SETTING UP MAILVELOPE: AN APP FOR EMAIL ENCRYPTION

    STEPS FOR SETTING UP MAILVELOPE: AN APP FOR EMAIL ENCRYPTION

    It is amazing how far we have come with encryption. I believe if you came across my past posts on encryption, you had a grasp on what symmetric and asymmetric encryption is about. These are adventurous topics that dive you into the world of technology, especially while communicating via email. Today we are going to…

Follow us on Social Media

Enjoy this blog? Please spread the word :)