エピソード

  • Applicable Laws for Deepfakes
    2024/05/12
    Applicable Laws for Deepfakes
    続きを読む 一部表示
    1 分
  • Cyber Security: Game Threats
    2021/05/23

    Online gaming is reaching a new zenith. Did you know: The online gaming industry of India will add approximately 190 million gamers by the year 2021.

    Voice over by Jyoti Nene

    続きを読む 一部表示
    9 分
  • Cyber Security: DoS and DDoS
    2021/05/23

    Denial of Services (DoS): An attack to make a system or network resource unavailable to its intended users

    Distributed Denial-of-Service (DDoS): An attack to make a system or network resource unavailable to its intended users by using another computer

    続きを読む 一部表示
    5 分
  • Cyber Security: Wi-fi Hacks
    2021/05/23

    Yes, a Wi-Fi router can be hacked and you may not even be aware of the same.

    Highlights:

    • Routers with weak encryption such as WEP Security can be hacked easily
    • Using Default Wi-Fi Password is the weakest link and the common mistake that most of us do
    続きを読む 一部表示
    6 分
  • Cyber Security: Man-In-The-Middle Attack
    2021/05/23

    MITM – Eavesdropping or Interception of the communication between two targets for malicious reasons. This type of attack allows the attacker to listen to a conversation that should not be heard.

    Voice over by Jyoti Nene

    続きを読む 一部表示
    5 分
  • Cyber Security: Password Theft
    2021/05/23

    Password theft is a common threat in digital age and is the main vector for serious crimes like identity theft and fraud. Passwords are the protection against fraud and lots of confidential and sensitive information however few personnel choose passwords that are really secure and complicated.

    Voice over by Jyoti Nene

    続きを読む 一部表示
    5 分
  • Cyber Security: Phishing a variant of Social Engineering
    2021/05/23

    Do you know Phishing is a variant of social engineering – thus, evading controls via trust. Phishing attacks and crime have grown in large numbers in the recent years because of the simplicity in launching the attack and the amount of information the cybercriminals get successfully.

    Voice Over by Jyoti Nene

    続きを読む 一部表示
    6 分
  • Cyber Security: Preventing Email Spoofing
    2021/04/25

    E-Mail Spoofing one of the most common and top vector used by cybercriminals for unethical activities and one of the preferred types of email attacks are Business Email Compromise (BEC). In this type of attack, most of the email users receive an email that has been spoofed.

    Voice Over by Jyoti Nene

    続きを読む 一部表示
    4 分