Hey I am on Medial • 1y
Hack-proof systems are not possible only due to big tech faults, but also because of our negligence to security measures on our side, and I believe that with the growing dependency on digital products, we should teach these security measures in school. How to Create Strong Passwords What are Phishing attacks? What is 2-factor authentication? How to ensure security when logging into third-party plugins How to Monitor Account Activity Safely
Cyber Security Stude... • 1y
Security logging and monitoring failures can be detrimental to any organization's cybersecurity posture. Insufficient logging and monitoring capabilities pave the way for attackers to exploit vulnerabilities undetected, leaving organizations vulnerab
See MoreFounder of VistaSec:... • 1y
🚨 Top IoT Vulnerabilities You Need to Know! 🚨 🔹 Weak Passwords & Default Credentials – Many IoT devices ship with default passwords that are easy to guess. 🔹 Unpatched Firmware – Outdated software can have security flaws that hackers exploit. 🔹
See MoreI am the exploit • 4m
Currently researching the security domain of AI ethics, exploring how vulnerabilities in AI models can lead to data breaches and adversarial attacks. My focus is on building secure, transparent AI systems that defend against manipulation. #AIEthics #
See MoreFull Stack Web Devel... • 3m
With over 80% of breaches tied to compromised passwords, biometric security—fingerprint, facial, iris and voice recognition—offers stronger, non‑transferable authentication and can reduce fraud by up to 99%. It boosts convenience but raises privacy r
See MoreI'm just a normal gu... • 10m
Pakistan-based cyber groups have reportedly launched coordinated attacks on several Indian defence websites, compromising login credentials and gaining unauthorized access to sensitive information related to defence personnel. According to NDTV, th
See MoreDownload the medial app to read full posts, comements and news.