Welcome to My Blog
Teens, Drugs & Dark Web: Parents need to know the Underworld of the Cyberspace
June26 is marked and celebrated as “The International Day against Drug Abuse and Illicit Trafficking”; It was established in 1987 by the United Nations.
read moreDigital Yoga: Be a Master of Digital Technology, not Slave
“They serve you, don’t slave you”. Be a master of technology through regular practice of Digital Yoga and make Smart Digital India.
read moreTypes of Cyber Crimes: Phishing & Pharming
A means to point you to a malicious and illegitimate website by redirecting the legitimate URL.
read moreTypes of Cyber Crimes: Spam, Spoofing, Eavesdropping
Spam is one of the more common methods of both sending information out and collecting it from unsuspecting people.
read moreTypes of Cyber Attacks: Worms, Trojan Horse, Ransomware
A Trojan horse may not be a term you’re familiar with, but there’s a good chance you or someone you know has been affected by one.
read moreTypes of Cyber Attacks: Virus, Malware, Spyware
Any attachment you create using this program and send to someone else could also infect them with the virus.
read moreTypes of Cyber Attacks: Botnets, DDos, Hacking
If you’ve never heard of a botnet, it’s likely because they go largely undetected.
read moreCyber World’s Activities & Risks: Voice Over Internet Protocol (VoIP)
Getting hit with Spam over Internet Telephony (SPIT). SPIT is a fast, cheap and invasive way for telemarketing messages to reach you.
read moreCyber World’s Activities & Risks: Downloading and File Sharing
Downloading unwanted pornography labelled as something else.
read moreCyber World’s Activities & Risks: Online Gaming and Entertainment
Inadvertently downloading viruses, Trojan horses, worms, and spyware contained in game downloads onto your computer.
read moreThe risks of shopping and online auctions
Doing business on sites that aren’t encrypted which can leave your information open to anyone.
read moreCyber World’s Activities & Risks: Mobile
Mobile phones are small and can easily be stolen, potentially putting your stored usernames and passwords in the wrong hands.
read moreCyber World’s Activities & Risks: Social Networking
If you add “friends” you don’t know, you could become the victim of a scam.
read moreCyber World’s Activities & Risks: Banking and Finance
Steal account information by capturing your keystrokes, such as the credit card or bank card number you entered or images you’ve chosen to authenticate your identity.
read moreCyber World’s Activities & Risks: Email
Email has become such an essential part of life that many people now choose to send a message rather than make a phone call.
read more5 tips to make your Facebook Account Safer
You don’t want strangers checking you out on Facebook (presumably) so make sure you limit who can view your Facebook timeline.
read moreAre you Social Media Addict ? Yes or No
Mobile social media offer a large number of experiences from a psychological viewpoint, each with powerful features that can lead to problem behavior.
read moreOnline Profiling of Employees
Most of us have probably ‘googled’ someone to find information about them. Perhaps we searched for information on a potential flatmate, a new colleague, or even a new boss.
read more3 Tips for Smart Digital Parenting !
62% of kids reported using their smartphones after bedtime.
read moreInternet of Things
The important features of Internet of Things involve connectivity, artificial intelligence, active engagement, sensors and the use of small devices.
read more