Author: Campus Journalist

बोर्ड परीक्षाओं के विद्यार्थियों की शत-प्रतिशत सफलता सुनिश्चित करने के लिए कुछ विनम्र सुझाव कक्षा 10वीं एवं 12वीं की बोर्ड परीक्षाओं में सम्मिलित होने वाले विद्यार्थियों...

1. MITM Attack Your data is not encrypted. MITM – Man In The Middle , an attack type where the attacker type where the attacker secretly...

Google is the biggest search engine now ruling the web. But did you know, Google is storing your private data. Yes, Google keeps tabs on a...

Play age appropriate, knowledgeable and educational games for fun and entertainment only. Never reveal your real name, location, gender, age, or any other personal information. Never...

Cyber criminals are using different mode of attacks to get your personal data, Phishing Scams are one of them. What is Phishing? Phishing Scams are typically...

Some of the biggest and best targets hackers choose are company accounts. HR departments of many companies, for example, are often very conservative in their approach...

CEO Fraud is a scam in which cyber criminals spoof company email accounts and impersonate executives to try and fool an employee in accounting or HR...

1.Don’t Register For An Account Until You’re 13. While you may want an account when your 11 or 12, Facebook specifically forbids anyone younger than 13 from registering....

Did you know Google has its own dedicated password manager? It’s more than just password-syncing built into the Chrome browser .Google’s solution also offers a web app,...

1. TEAM LEADER  The team leader of an OCG works typically in close contact to the team and orchestrates operations. The leader works with the OCG...