Archives
Beware of Sarahah App
August 10, 2017 11:44 am Leave your thoughtsPreface Sarahah is a website created by the developer from Saudi Arabia Zain al-Abidin Tawfiq. Sarahah means candor and honesty. It... View Article
Biometric Based Identity Verification
August 10, 2017 10:51 am Leave your thoughtsBiometric Based Identity Verification Biometrics use diverse technologies for measuring and analyzing physical human attributes such as fingerprints, eye retinas,... View Article

Insights of CCTV Surveillance
August 9, 2017 9:50 am Leave your thoughtsClose circuit television is a circuit, which is used to display images take videos and to keep a complete vigilance... View Article
Data Leakage using Social Fun App
August 6, 2017 1:34 pm Leave your thoughts“What was the old age?” “Who is your favorite friend?” “How many lovers you have?” “Which celebrity looks alike you?”... View Article
Terrifying Cyber Crime Through ‘Blue Whale Challenge’
August 5, 2017 12:14 pm Leave your thoughtsPreface Trust you have already heard about the death game named ‘Blue Whale Challenge’. The same is in news in... View Article
Vulnerability Assessment versus Penetration Testing
August 3, 2017 12:57 pm Leave your thoughtsAs information security professionals, most of us are familiar with vulnerability assessments and Penetration testing (pen tests for short). Both... View Article