Posts

6 settings you need to know to use Facebook safely

Image
6 settings you need to know to use Facebook safely Normally we use Facebook, but we are not in the habit of checking the settings from time to time. To run Facebook safely, you need to take care of its privacy settings and other essentials. Facebook contains innumerable personal details of users. But if care is not taken, cybercriminals can steal and misuse such details.

Don't want to see old unpleasant incidents on Facebook? Do it

Image
Don't want to see old unpleasant incidents on Facebook? Do it Have you noticed that your old photos come in memory on Facebook every day? Some even look at old memories for themselves. But some may think that it would not have been a feature called memory. Not only on Facebook but also in Google Photos, our old photos are coming into the memory every day, which includes our memorable moments.

What is Ethical Hacking? How is it different from other hacking?

Image
What is Ethical Hacking? How is it different from other hacking? As the scope of technology and the digital sector grows, so does the attack on this sector. Formerly limited to the Local Area Network (LAN), the area has now expanded to mobile devices, wireless networks, and the Internet of Things. Institutions are also adopting various measures to solve various problems related to technology. However, the increasing scope of technology has also increased the range of attacks.

The dangerous Trojan virus spread on social media, affecting tens of thousands of users in 140 countries

Image
The dangerous Trojan virus spread on social media, affecting tens of thousands of users in 140 countries More than 10,000 social media accounts in 140 countries have fallen victim to the new Android Trojan. Cyber ​​security company Zimperium recently released a report claiming that the Trojan virus was spread through social media hijacking, third-party app stores, and sideloaded applications. According to Zimperium, the attack began last March, when the Trojan was first spread from a Facebook account.

Things to pay attention to when using public WiFi

Image
Things to pay attention to when using public WiFi We are happy to get free WiFi and start opening online accounts. Some people even do important things. It is important to exercise caution when using free WiFi in public places.

Google brings a new bug bounty platform, so be a participant

Image
Google brings a new bug bounty platform, so be a participant Lately, Bug Bounty has been becoming a topic of interest among Nepali youth. The bugs in the systems of international companies like Google, Facebook, Twitter, i.e. security vulnerabilities are found and the number of people earning is increasing. Meanwhile, Google has launched a new Bug Bounty platform. It has been 10 years since the company started giving rewards to those who find weaknesses in Gmail, Drive, Android, and other products. With this in mind, the company has launched a new platform 'Bughunters'.

Now you can join the clubhouse even if no one invites you

Image
Now you can join the clubhouse even if no one invites you The social media app Clubhouse can now be connected without 'invitation'. The company has adopted a new policy to broaden its scope. Earlier there was a provision that if you want to join the clubhouse, someone should invite you. But, now everyone can easily join the clubhouse. Co-founders of the company Paul Davidson and Rohan Seth have given information about this. According to him, around 10 million people are currently on the 'waiting list', which will be approved in the app.

This is how your data is being stolen through social media

Image
This is how your data is being stolen through social media How often do you share your personal details on social media? You may have shared general details like name, address, age, job, marital relationship. What you may not know is that your seemingly simple personal details are being sold online by hackers at a high price for use in cybercrime. The hacker, who identified himself as Tom Liner last month, did so in the name of fun. In the name of his fun, he hacked the database of 700 million users of LinkedIn around the world and sold it for about five thousand US dollars or five lakh 96 thousand rupees.

WhatsApp's new features, photos, and videos will be automatically deleted as soon as you see them

Image
WhatsApp's new features, photos, and videos will be automatically deleted as soon as you see them  Instant messaging app WhatsApp has introduced a new feature for sharing photos and videos for its users. The company has unveiled a beta version of the "View Once" feature for iOS and Android users. Under this feature, users who receive a photo or video sent by a user will be automatically removed from the chatbox once viewed. This is a feature already available on Instagram. But on Instagram, users can view photos/videos once and then a second time. On WhatsApp, you will not be able to watch the video once you have watched it again. Snapchat has started this feature on social media.

One challenge after another for the user, along with phishing, now also need to avoid vishing

Image
One challenge after another for the user, along with phishing, now also need to avoid vishing  ‘Voice Plus Phishing’ is a phishing attack based on a voice or VoIP. In which cybercriminals use social engineering to call from telephone, mobile, Viber, Messenger, WhatsApp, or any unknown number and seduce or intimidate the user. Sensitive personal and financial details of the computer and mobile users are requested under the pretext of providing false information about the problem in the user's bank account, credit card or PIN number, etc. From receiving emails and passwords, PIN codes, bank account numbers, etc., to attempts to get money deposited into your account from a bank, this is what happens.