Fake News: Can We Not Forward Everything?

According to Quartz, nearly 37% of WhatsApp forwarded messages are either scam or are meant to scare people for fun. Today, social media platforms have become a place where an individual finds his voice and can express himself for who he is. Somewhere in between, technology has set the stage for troublemakers who love to spread rumours and fake news that can destroy someone’s life.

Either knowingly or unknowingly, we are responsible for it, too.

Continue reading “Fake News: Can We Not Forward Everything?”

Dangers of Social Engineering | Cybersecurity Basics

Consider this – whenever you think of the term “hacking” or hear about different cyber-attacks, the first image that may pop in your mind is probably a guy in a black hoodie, sitting in a dark room, typing away in his laptop. Well, that is not how it works in the real world. This is where social engineering comes into the picture. Social engineering is nothing new though, it dates back to the infamous Trojan Horse that leads to the fall of Troy, but is often overlooked due to lack of awareness.

Continue reading “Dangers of Social Engineering | Cybersecurity Basics”

SQL Injection & Prevention | Web Security

featured image

SQL stands for Structured Query Language. To understand what SQL Injection is, it is important to understand how information on the web is stored. A database is used to store data such that it is easy to access and manage data efficiently. There are two kinds of databases – Relational and Non-Relational. Relational database stores data in the form of rows and columns while non-relational database store data mainly in four fashions – Key-value, Graph, Column, and Document.

Continue reading “SQL Injection & Prevention | Web Security”