Back

Anonymous

Anonymous

Hey I am on Medial • 6m

Hack-proof systems are not possible only due to big tech faults, but also because of our negligence to security measures on our side, and I believe that with the growing dependency on digital products, we should teach these security measures in school. How to Create Strong Passwords What are Phishing attacks? What is 2-factor authentication? How to ensure security when logging into third-party plugins How to Monitor Account Activity Safely

0 replies5 likes

More like this

Recommendations from Medial

Devak K

Hey I am on Medial • 1m

How to Avoid Phishing Scams | Digitdefence Protect yourself from phishing scams by recognizing suspicious emails, links, and websites. Always verify the source before clicking and use strong, unique passwords.

0 replies2 likes

Vasvi Seth

Cyber Security Stude... • 9m

Security logging and monitoring failures can be detrimental to any organization's cybersecurity posture. Insufficient logging and monitoring capabilities pave the way for attackers to exploit vulnerabilities undetected, leaving organizations vulnerab

See More
0 replies4 likes
Image Description
Image Description

Devak K

Hey I am on Medial • 1m

Common Network Security Threats | Digitdefence Explore common network security threats like malware, phishing, and ransomware, and learn how to protect your systems from these malicious attacks. https://digitdefence.com/cyber-security-services/netwo

See More
2 replies3 likes
Image Description
Image Description

Ritik Bisen

Full Stack Developer... • 9m

How to access the dark web safely????

6 replies8 likes

Sheikh Ayan

Founder of VistaSec:... • 14h

🚨 Beware of Advanced Persistent Threats (APTs)! 🚨 Cybercriminals are getting smarter, using stealthy APTs to infiltrate systems, steal sensitive data, and stay undetected for months! 😨 🔎 What is an APT? An Advanced Persistent Threat is a targe

See More
0 replies3 likes

Sheikh Ayan

Founder of VistaSec:... • 19d

🔐 Cybersecurity Tip: Protect Your Online Accounts! 🔐 Want to keep hackers out? Follow these steps: ✅ Enable 2FA – Use an authenticator app for extra security. ✅ Use Strong Passwords – Mix uppercase, lowercase, numbers & symbols. ✅ Beware of Phish

See More
0 replies1 like
Anonymous
Image Description
Image Description

Is Instagram safe to use? I've been reading up on Instagram's security and the various scams that are circulating, like phishing and fake giveaways. It's surprising how sophisticated some of these scams can be! What are your thoughts on Instagram'

See More
14 replies11 likes
Image Description

Chamarti Sreekar

Passionate about Pos... • 1m

A report from The Information states that a hacker claims to have stolen login credentials— including emails and passwords— for 20 million OpenAI accounts and is selling them on the dark web. OpenAI is investigating the matter but maintains that the

See More
1 replies12 likes
Image Description

Gaurav Kumar

Software engineer • 7m

🌐🔒 Keeping your website secure is crucial! What are some security measures you use to protect your site? Share your tips! 🛡️

2 replies2 likes
Image Description
Image Description

Surya

Product • 4m

🚨 Cyber Threats Are Evolving – Here’s What You Need to Know 🚨 Hackers are getting creative with new tactics and tools. Here are the latest threats and solutions to protect your business! 👇 🔹JPHP Malware (Pronsis Loader) - Rare language: Bypa

See More
7 replies1 like

Download the medial app to read full posts, comements and news.