August 9, 2020

This Article Written by Trainee Ali Al-Agnam From King Faisal university #KFU

What is cloud computing?

Cloud Computing is the use of hardware and software to deliver a service over a network (typically the Internet). With cloud computing, users can access...

August 9, 2020

This Article Written by Trainee Heyam Aljaser From King Saud University #KSU

The simplest explanation of a cookie is that it’s a files that contain small pieces of data, used to track your online activity. like a username and password that are exchanged b...

August 9, 2020

مع ازمة كورونا... هل تغير سلوك المخترقين حول العالم؟ - مقال كُتب بواسطة ديم الدخيّل من جامعة المجمعة

حمل النصف الأول من العام تحديات في مجال الأمن السيبراني حول العالم؛ بسبب ازدياد نسب الهجمات الإلكترونية وعمليات القرصنة عبر فيروسات "إلكترونية" مختلفة عن فيروس كورونا.

اك...

July 22, 2020

This Article Written by Trainee Hasan Bahabri From Imam Mohamad bin Saud University #IMU

What is Hacking?

Hacking generally refers to unauthorized intrusion into a computer or a network.

Hacking Statistics:

  • Cybercrime is more profitable than the global illegal drug tra...

July 20, 2020

This Article Written by Trainee Shahad AlGhamdi From Princess Nourah Bint Abdulrahman University #PNU

What are Bots, Botnets and Zombies in cyber Security?

A bot, short for "robot", is a type of software application or script that performs automated tasks...

July 20, 2020

This Article Written by Trainee Ahmad AlGhamdi From Imam Mohamad bin Saud University #IMU

SIEM:

  • A centralized system for managing cyber security that combines functionality ...

July 13, 2020

This Article Written by Trainee Mohammed Al-Salboukh From King Fahd University of Petroleum and Minerals #KFUPM

Evans stated that 50 billion connected things will be in use worldwide in 2020, started from 2016, there are more than 5.5 million new things got co...

July 8, 2020

This Article Written by Trainee Rayan Alsuhaibani From King Saud University #KSU

What is Social Engineering?

  • The hacking of humans, using knowledge of human behavior to elicit a defined response.

Or

  • Manipulation of a user into revealing confidenti...

July 8, 2020

This Article Written by Trainee Bandar AlOsaimi From Imam Mohamad bin Saud University #IMU 

The difference between cyber security and information security 

Before start Most technologists use the terms synonymously and mean the same ideas, b...

July 24, 2019

Knowledge is power, keeping your data safe and far away from the clutches of the hacking community is a need of the hour in today’s world. So, Nation should promote cyber awareness of cyber-related threats among the public people, companies and government employees and...

Please reload

Featured Posts
Recent Posts
Please reload

Archive