It’s not a secret anymore, Hackers know our passwords. 551,509,767 real-world passwords previously exposed in data breaches. Are you one of those victims? Has your email been compromised or found in a data breach so far? How do hackers get your passwords? In this article, I am going to write the common methods which hackers […]
Meet Middle East thought Leaders Together with EC Council’s CISO Mag we invite you to join us for an infosec expert’s virtual session, a live summit happening in Middle East this June- “The Middle East CISO Forum” Topic: Cybersecurity in a hyper connected world [Free Registration] 29th June | 9:55 AM – 13:00 PM GST […]
Come and join my Team at SCB To Apply Via LinkedIn : The Role Responsibilities ICS 1st Line Risk Manager, AME will execute a robust and efficient plan to rollout ICS RTF by working with key stakeholders including COOs/CIOs direct teams, ICS RTF Implementation Programme teams, Office of the CISO and Security technology teams. The plan […]
Inside The Dark Web Best Seller in Amazon My new book “Inside The Dark Web” is number 3 in the best selling new Information Technology books at Amazon. Thank you very much for your support, Its an awesome feeling to see your hard work gets some attention . I am looking forward to see the […]
Information Gathering Methods Information gathering is not as challenging as it used to be a few years ago when one would only get details about a target either directly from the target or from asking around. The internet, more specifically the use of social media, has simplified this stage with newer and faster techniques of […]
Does Apple spy ? I am sure most of you read by now my article “Apple and Privacy “, for the ones who did not I highly recommend to read it,( here is the link ) below are some public feedback which I have received via LinkedIn from Gartner, Microsoft, Australian Government employees. I will […]