Browse Category

Recent Posts

11 Cybersafety Tips for Online Safety

© 2019 by

Our life is integrated with cyberspace. Cyberspace use becoming as normal as breathing air. But there is a BIG difference between the air we breathe and cyberspace we use. When we breathe foul air, we know from its smell that something is not right. Unfortunately, danger signs in the cyberspace are not as obvious to us as the foul smell of air. Hence, we need to stay alert to avoid safety hazards larking in the cyberspace. Cybersafety rules must be observed to stay safe in the cyberspace, because predators are relentlessly trying to find ways to steal our money and our personally sensitive information. Below are 11 top tips for online safety.

Cybesapce is infested with hazards and to protect from attacts one must follow rules for cybersafety aks online safety.
Alice has strong cybersafety; she is staying guarded against attracts coming from the Internet. She has strong online safety.

Keep Reading

9 Ways to Identify Phishing emails

© 2019 by

Phishing emails will not have a subject or heading that says they are a Phishing emails But if you look closely, you can see many tell-tell signs in a phishing email. You may find spoofed email  address and spoofed domain name among others. Moreover, they use social engineering.

You know that phishing is a big problem.  They attempt to obtain personally sensitive information (PSI) such as banking and credit card details, and password etc., usually for malicious reasons, by disguising as a legitimate entity or business. Let us review some tell-tell signs.

If you want to test your ability to identify phishing emails, then click here to take a quiz.

Phishing and Social Engineering
For Phishing, emails are used creatively.

Social Engineering

Suppose part of an email you received from your bank says, “… on Sunday at 6:00 AM money was withdrawn from you account. If you didn’t make the withdrawal, you MUST take security measure now.”

If you didn’t do a withdrawal, the fear of loss of money from bank and unauthorized activity in your bank account are likely to make you act swiftly.

Keep Reading

Malware Types

Do you know what a `zombie computer’ is? Many malware (malicious software) may turn a computer into a zombie that appears too slow to the user(s) of the computer, because they are using computer’s processor, memory, and other resources. Moreover,  they can steal personally identifiable information (PII) and  personally sensitive information (PSI)  stored in the computer.  We have a post on information types.

The diagram below shows a classification malwares. A brief introduction to each are provided next.

calssification of malware
Types of malware: traditional and advance


The reader should be warned that this classification is not universality accepted and it is possible to regroup them. Also, the description and function of each are short for brevity. If you think your computer (or digital device) is infected with one or more malwares, you may need professional help.

Discussion here is for a general introduction.
Keep Reading

Cybersecurity: An Overview

Do cybersecurity concern you? I am sure it does. Actually, it should be a concern to all of us, because most aspects of our life — information and assets — are now intricately intertwined with cyberspace. They are available from cyberspace, even if you are not a direct cyberspace user. The security issues in the cyberspace are topics of cybersecurity.

Before I discuss cybersecurity, let us see how we address our safety and security in our daily life. Every civil society has laws, law enforcement departments, and judicial system. But citizens keep their houses and cars locked, and their valuables in safe places. Our behavior in the cyberspace should resemble to what we do in our physical space, but unfortunately most of don’t. That is because we, I mean everyone of us, do not know and understand enough about cyberspace and, hence, the cybersecurity risks there. Yes, cybersecurity professionals know much more than common people, but cyberspace is an evolving world and new security issues are exposed by hackers and malicious actors. Let us now return to our topic, cybersecurity.



Let us look at the diagram  for a simplified pictorial view. The six blocks shown within security perimeter requires cybersecurity measures. Namely, they are:

Keep Reading