Knowlegde

Hack me if you can episode 1

0 comments
Hacker

Hack me if you can episode 1 will teach you how to deal with malicious intrusions from remote work. It mentioned the…

Read More

How to solve the cybersecurity resources crisis

0 comments

Resources have always been one of the major problems on cyber security, especially for the NGOs that lack of resources. This article…

Read More

CISA Releases Free Detection Tool for Azure/M365 Environment

0 comments

Cybersecurity and Infrastructure Security Agency (CISA) released a free detection tool on GitHub, which is used for detecting possible compromised accounts and applications…

Read More

‘Tis the Season for Nonprofit Cybersecurity Risks to Reach New Heights

0 comments

Due to COVID-19 pandemic, more and more NGOs have transformed part of their services from offline to online; meanwhile, many NGOs will…

Read More

Enterprise VPN Security Guideline

0 comments

The Enterprise VPN is a common technology to support remote working during global pandemic outbreak. However, adopting enterprise VPN without proper risk…

Read More

Identity Theft Protection for Social Media and Instant Messaging Accounts

0 comments

Social media and instant messaging software have become essential tools for our daily social interaction and communication. Therefore it is important to…

Read More

Case Study on Bitcoin Scam Incident – A Combined Social Engineering and Privilege Escalation Attacks

0 comments

On 15 July 2020, a total of 130 high-profile accounts in a major social networking platform were compromised by outside parties to…

Read More

End-of-Support for Adobe Flash Player after 31 December 2020

0 comments

Adobe had announced that Flash Player will no longer be supported after 31 December 2020, meaning the end of this life-long web…

Read More

New Flaws in Top Antivirus Software Could Make Computers More Vulnerable

0 comments

A computer with inadequate antivirus security is like a bank where all the doors are always open. Antivirus security is computer’s first…

Read More

Hacking Group Used Malware to Bypass 2FA (2 Factor Authentication) on Android Devices

0 comments

Nowadays, use of mobile devices are common in NGOs. The importance for Mobile Device Management is keep on increasing. New security threats…

Read More
1 2 3 4 5 6

ESSENTIAL