Skip links

LinkedIn

Hacking

Don’t let Hackers steal your password 2

It’s not a secret anymore, Hackers know our passwords.  551,509,767 real-world passwords previously exposed in data breaches. Are you one of those victims? Has your email been compromised or found in a data breach so far? How do hackers get your passwords? In this article, I am going to write the common methods which hackers […]

Hiring

Come and join my Team at SCB -Great Opportunity 2019

Come and join my Team at SCB To Apply Via LinkedIn : The Role Responsibilities ICS 1st Line Risk Manager, AME will execute a robust and efficient plan to rollout ICS RTF by working with key stakeholders including COOs/CIOs direct teams, ICS RTF Implementation Programme teams, Office of the CISO and Security technology teams. The plan […]

amazon best seller

Inside The Dark Web Best Seller in Amazon

Inside The Dark Web Best Seller in Amazon My new book “Inside The Dark Web” is number 3 in the best selling new Information Technology books at Amazon. Thank you very much for your support, Its an awesome feeling to see your hard work gets some attention . I am looking forward to see the […]

Information Gathering Methods

Information Gathering Methods

Information Gathering Methods Information gathering is not as challenging as it used to be a few years ago when one would only get details about a target either directly from the target or from asking around. The internet, more specifically the use of social media, has simplified this stage with newer and faster techniques of […]

Explore
Drag