Skip to content
Let's Tech It Easy

Let's Tech It Easy

Header Advertise
Menu
  • Home
  • About
  • Blog
  • Contact
  • My Tickets
  • Submit Ticket
  • Home
  • Blog
  • Cyber Security

Category: Cyber Security

Android Computers Cyber Security iPhones Mac

How to protect against ransomware?

Naresh30 January 202330 January 2023
Ransomware is a type of malicious software that encrypts a victim's files. The attackers then demand a ransom payment to decrypt the files, typically paid in cryptocurrency such as Bitcoin....
Android Cloud Computers Cyber Security iPhones Mac Social media

The future of Smart Cities

Naresh30 January 202330 January 2023
The future of smart cities is one that integrates advanced technologies to improve urban living and create more sustainable, efficient, and interconnected communities. This will include the widespread adoption of...
Computers Cyber Security

Cybersecurity – Evolution of Ransomware

Naresh30 January 202330 January 2023
Cybersecurity is a critical aspect of modern society as it protects individuals, organizations, and governments from online threats such as hacking, identity theft, and other forms of cybercrime. The increasing...
Cloud Computers Cyber Security virtual reality

Autonomous Vehicles

Ishab Timalsina30 January 202330 January 2023
https://www.smartcitiesworld.net/opinions/opinions/driving-autonomous-vehicles-forward-with-intelligent-infrastructure Autonomous vehicles, also known as self-driving cars, are vehicles that are capable of navigating and driving themselves without the need for human input. These vehicles use a combination of...
Android Cloud Computers Cyber Security iPhones Mac virtual reality Windows

Biometric Technologies

Ishab Timalsina27 January 202327 January 2023
https://www.scnsoft.com/blog/biometric-technology-advanced-technologies-are-making-their-way-into-the-workplace Biometric technologies identify or authenticate individuals based on their unique physical or behavioural characteristics. These technologies are commonly used for security and identification purposes, such as in access control...
Cloud Computers Cyber Security

Neuromorphic Computing

Ishab Timalsina23 January 202327 January 2023
https://cacm.acm.org/magazines/2020/8/246356-neuromorphic-chips-take-shape/abstract Neuromorphic computing is a type of computing that is based on the structure and function of the human brain. It involves using specialised hardware and software that mimics how...
Cloud Security
Cloud Computers Cyber Security Windows

Cloud Security

Diyana Weerasuriya6 January 20236 January 2023
What is Cloud Security? Before defining cloud security, we should know what cloud computing is. To enable rapid innovation, flexible resources, and scale economies, cloud computing delivers computing services over...
Blue Borne Security Vulnerability
Computers Cyber Security Mac Windows

Blue Borne Security Vulnerability

Diyana Weerasuriya6 January 20236 January 2023
What is Blue Borne? IoT security company Armis described "BlueBorne" as a collection of Bluetooth implementation flaws in multiple operating systems (OS), including Android, Linux, iOS, and Windows. They can...
What is Browser in the Browser Attack (BitB Attack)?
Computers Cyber Security Mac Windows

What is Browser in the Browser Attack (BitB Attack)?

Diyana Weerasuriya6 January 20236 January 2023
A Browser-in-the-Browser (BiTB) attack uses a faked domain to simulate a login window within a parent browser window to obtain login information. This phishing tactic uses the Single Sign-On authentication...
Cloud Computers Cyber Security Mac Windows

Review of blockchain technology and how it works

Manpreet Kaur4 January 20234 January 2023
If you are like most people, you have probably heard of blockchain technology, but you may not be entirely sure what it is or why you should care about it....

Posts navigation

1 2 … 17 Next

You too can join us

If you also think about technology and want to contribute either as a mentor or even from a learner’s perspective, look no further and join us. Write us at [email protected] and share your opinion. Our team will get back by sending you an invite to join the platform as a contributor. Empower others, empower yourself so each one of us can play with the technology safely one day without being scared.

Subscribe Here

Loading
Close
Menu
  • Home
  • About
  • Blog
  • Contact
  • My Tickets
  • Submit Ticket
Social profiles
  • Home
  • About
  • Blog
  • Contact
  • My Tickets
  • Submit Ticket
  • Home
  • About
  • Blog
  • Contact
  • My Tickets
  • Submit Ticket
Copyright All rights reserved | Theme: Blog Prime by Themeinwp.
  • Home
  • About
  • Blog
  • Contact
  • My Tickets
  • Submit Ticket