Bruce Schneier
18 January 2024
A renowned cybersecurity expert, known for his contributions to cryptography, privacy advocacy, and author of influential books on digital security.
Read More >>Kevin Mitnick
09 January 2024
American cybersecurity consultant, author, and former hacker, famously known for his high-profile arrest and later work in computer security.
Read More >>Gordon Lyon
18 December 2023
creator of Nmap, a network scanning tool using IP packets to identify devices and gather information on services and operating systems.
Read More >>MafiaBoy
11 December 2023
Explore the fascinating journey of MafiaBoy, an emblematic figure in cybersecurity. From the tumultuous DDoS attacks in the 1990s to his transformation into a cybersecurity advocate, discover how his story shaped awareness and positively influenced the digital community. A reflective look at the evolution from a teenage hacker to a respected speaker, highlighting the importance of ethics in the digital universe.
Read More >>Julian Paul Assange
08 December 2023
An Australian activist, computer programmer, journalist and founder of the website WikiLeaks.
Read More >>MACRO-VIRUS:A DEEP DIGITAL THREAT
28 November 2023
In the field of computer science, a macro virus, also known as a macrovirus, refers to a type of computer virus that is developed using a macro language. This language is built within an application software, such as a word processor.
Read More >>My Experience November/20/23
20 November 2023
Explore my recent journey into website vulnerability analysis, from technical challenges to raising awareness about cybersecurity. Strengthening skills and dedicated to a safer online environment.
Read More >>Remote Process Injection
31 October 2023
remote process injection is a technique used by attackers to execute malicious code in remote processes with the goal of gaining control or unauthorized access to target systems or servers. This technique poses a significant threat to information security.
Read More >>Access Token Manipulation
27 October 2023
Is a cybersecurity technique with both legitimate and malicious applications. This method involves obtaining, modifying, or misusing access tokens used in authentication and authorization systems.
Read More >>