0

Oversharing on Social media

oversharing

Most of us today use social networks to share personal information, such as the name, location, contact information and photos, and professional information, such as the company name and work location. Have you ever thought about someone misusing this information?… Continue Reading

0

How to prevent Vishing

Vishing, also known as phone phishing, is similar to phishing and is executed through fake telephone calls. Unlike other types of phishing where an email message is used, vishers use telephone to execute their fraudulent objectives. The vishers usually appear… Continue Reading

0

Cyberbullying

Cyberbullying

Cyberbullying is a crime where a person bullies or threatens another person through the Internet. It involves sending threatening messages to a person or sharing rumors and incorrect information about a person in public with an intention to insult or… Continue Reading

0

What is social engineering?

Social engineering

What is social engineering? Are you aware of how it is done and the impact it may have on you? Social engineering is a method executed using psychological manipulation of people in order to make them reveal sensitive information. In social engineering… Continue Reading

0

Cyber insurance

cyber insurance

Cybersecurity is important in today’s internet world. To recover business or individual from any cyber risks or internet based risks, there are insurance products available in the market called cyber insurance. It doesn’t protect business or individual from any cyber attack or… Continue Reading