Author: admin

0

CYBER – TERROR

How real is the threat? Cyber-terrorism is a menace that has people’s attention. Headlines, politicians’ focus, and security both the public and experts. But how genuine is the threat? Could terrorists harm vital military...

0

STATE OF CYBER SECURITY 2022…!

We live in a digital age. In our professional, personal and financial lives, the internet, mobile computers and electronic media have grown increasingly crucial. Unfortunately, as a result of this ubiquitous tendency, we are...

0

COMMON CYBER ATTACKS

When a purposeful and hostile attempt is made to breach an individual’s or organization’s information system, it is referred to as a cyber-attack. Cyber-attacks are becoming more widespread, and with the emergence of network-based...

0

DEFENCE AND ATTACK IN CYBERSPACE

The Internet of Things, cloud computing, and other developing technologies are propelling the rapid development of cyberspace, which is becoming the fifth dimension of human activity. But as cyberspace security issues worsen, traditional defence...

0

DIGITAL LENDING

It is a new process of lending an amount to seekers. This process is performed online with the help of web platforms and mobile apps. The lenders may be a bank, an NBFC, or...

0

E-Banking Type, Registration & Security

E-banking is electronic banking, which may also be called digital banking, net banking, and mobile banking. Sometimes virtual banking as well. In this banking method, the telecommunication network, computers, and smartphone devices are used....