Posts

Gold unseen by Nepalis: Bitcoin

Image
Gold unseen by Nepalis: Bitcoin Bitcoin may sound like a coin of a country. But no, Bitcoin is an Internet-based cryptocurrency invented in 2009. Bitcoin is an electronic currency made up of complex mathematical problems, in which no central bank or institution has control. However, it can also be called a decentralized electronic property.

Delete your Facebook account like this forever

Image
Delete your Facebook account like this forever If you've been watching the latest news, you've probably heard the news on Facebook. Facebook itself is aware of the issue of teenagers being injured due to its services like Instagram. Facebook's internal research report also mentions the company's weaknesses in the fight against false information. On Tuesday, Facebook CEO Mark Zuckerberg even commented on it in a post.

6 settings you need to know to use Facebook safely

Image
6 settings you need to know to use Facebook safely Normally we use Facebook, but we are not in the habit of checking the settings from time to time. To run Facebook safely, you need to take care of its privacy settings and other essentials. Facebook contains innumerable personal details of users. But if care is not taken, cybercriminals can steal and misuse such details.

Don't want to see old unpleasant incidents on Facebook? Do it

Image
Don't want to see old unpleasant incidents on Facebook? Do it Have you noticed that your old photos come in memory on Facebook every day? Some even look at old memories for themselves. But some may think that it would not have been a feature called memory. Not only on Facebook but also in Google Photos, our old photos are coming into the memory every day, which includes our memorable moments.

What is Ethical Hacking? How is it different from other hacking?

Image
What is Ethical Hacking? How is it different from other hacking? As the scope of technology and the digital sector grows, so does the attack on this sector. Formerly limited to the Local Area Network (LAN), the area has now expanded to mobile devices, wireless networks, and the Internet of Things. Institutions are also adopting various measures to solve various problems related to technology. However, the increasing scope of technology has also increased the range of attacks.

The dangerous Trojan virus spread on social media, affecting tens of thousands of users in 140 countries

Image
The dangerous Trojan virus spread on social media, affecting tens of thousands of users in 140 countries More than 10,000 social media accounts in 140 countries have fallen victim to the new Android Trojan. Cyber ​​security company Zimperium recently released a report claiming that the Trojan virus was spread through social media hijacking, third-party app stores, and sideloaded applications. According to Zimperium, the attack began last March, when the Trojan was first spread from a Facebook account.

Things to pay attention to when using public WiFi

Image
Things to pay attention to when using public WiFi We are happy to get free WiFi and start opening online accounts. Some people even do important things. It is important to exercise caution when using free WiFi in public places.

Google brings a new bug bounty platform, so be a participant

Image
Google brings a new bug bounty platform, so be a participant Lately, Bug Bounty has been becoming a topic of interest among Nepali youth. The bugs in the systems of international companies like Google, Facebook, Twitter, i.e. security vulnerabilities are found and the number of people earning is increasing. Meanwhile, Google has launched a new Bug Bounty platform. It has been 10 years since the company started giving rewards to those who find weaknesses in Gmail, Drive, Android, and other products. With this in mind, the company has launched a new platform 'Bughunters'.

Now you can join the clubhouse even if no one invites you

Image
Now you can join the clubhouse even if no one invites you The social media app Clubhouse can now be connected without 'invitation'. The company has adopted a new policy to broaden its scope. Earlier there was a provision that if you want to join the clubhouse, someone should invite you. But, now everyone can easily join the clubhouse. Co-founders of the company Paul Davidson and Rohan Seth have given information about this. According to him, around 10 million people are currently on the 'waiting list', which will be approved in the app.

This is how your data is being stolen through social media

Image
This is how your data is being stolen through social media How often do you share your personal details on social media? You may have shared general details like name, address, age, job, marital relationship. What you may not know is that your seemingly simple personal details are being sold online by hackers at a high price for use in cybercrime. The hacker, who identified himself as Tom Liner last month, did so in the name of fun. In the name of his fun, he hacked the database of 700 million users of LinkedIn around the world and sold it for about five thousand US dollars or five lakh 96 thousand rupees.