cybersecurity

Advanced Tips to Safeguard your Online Privacy

We live in an era where privacy does not exist, well at least in your digital life. Every search you make, every feedback you...
Cybe rsecurity

Cyber Security in 2019

Cybersecurity has been a huge issue since the last two decades. Every coin has two sides and so did the Internet, as much as...
Zero Knowledge Proof- Featured Image

Zero Knowledge Proof : There won’t be any information to hack!

We have been part of a great technological transformation since last few decades. When you’ll look back, you’ll experience a wave of nostalgia as...
Ethical Hacking

Ethical Hacking: Points to Consider in 2019

The 2016 elections in the United States had one of the most unpredictable outcomes when the Republican Nominee Donald J. Trump was declared as...
Featured Image Smart Contract

An Ultimate Guide to Smart Contracts

With numerous scams happening not only in this country but also in the whole world, blockchain has successfully gained popularity. Thanks to all the...
Hash based Signatures

Quantum Robust Hash Based Signatures

Invented by Merkle in the 1970s, hash-based digital signatures have ever since taken its place as a mainstay for many, and have become the...
Spam Detection

Spam Detection using Naive Bayes Algorithm

Every day, we receive tons of irrelevant emails, some of which are simply marketing/promotional emails while others are fraudulent ones. The top tech companies...
Penetration Testing & Metasploit

Introduction to Penetration Testing & Metasploit With Windows

Penetration testing which is also referred to as pen testing or security testing is a practice that involves attacking information systems in a similar...
CompTIA Security

Introduction To CompTIA Security and Certifications

The CompTIA (Computing Technology Industry Association) is the key holder of CompTIA securities and Certifications. This association provides certifications to IT professionals who complete...
Public Key Cryptography

Introduction To Public Key Cryptography

To understand what public key cryptography really is and its advantages, we must first differentiate between two broad categories of encryption, namely Symmetrical and...