What is Piracy ?
In old days Piracy meant the practice of attacking and robbing ships at sea. Piracy has changed very little over […]
This category is designed to explain the concept of any specific idea.
In old days Piracy meant the practice of attacking and robbing ships at sea. Piracy has changed very little over […]
An email bomb or “mail bomb” is a malicious act in which a large number of email messages are sent […]
“Salami Slicing Attack” or “Salami Fraud” is a technique by which Cyber-criminals steal money or resources a bit at a […]
DoS attacks can be divided into two general categories—application layer attacks and network layer attacks. Each of these types of […]
A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network […]
Logic Bomb is a set of instructions secretly incorporated into a program so that if a particular condition is satisfied, […]
Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain unauthorized access. A Hacker is […]
Stalking is unwanted obsessive attention to a specific person. Physical stalking can involve following, secret surveillance, persistent and manipulative calling […]
Identity theft, also called identity fraud, use of an individual’s personally identifying information by someone else (often a stranger) without […]
The simplest definition is “Cyber-bullying is bullying with the use of digital technologies”. Cyber-bullying takes place over digital devices like […]
Phishing is a Cyber-attack where attackers trick users into doing something that is harmful to the victim in various ways. […]
Why is Cyber security important all of a sudden? We are living in a far more technologically advanced world than […]