How Does Email System Work (SMTP)- Email sending and receiving process requires multiple protocols to work together. These protocols are used by mail servers to exchange email between email clients and servers to retrieve and send email (IMAP, POP). To understand email working, email sending and receiving process, do watch the video-
Domain Name System (DNS) | Types of DNS | What Happens When You Visit a Website
Hackers steal your data by hijacking Bluetooth of your device
Bluetooth is being exploited by the hackers to hack our devices, steal data. Once device is infiltrated, hackers can listen your calls, read texts and even they may get OTP that you use to access various online facilities such as banking, shopping etc. I am sharing preventive measure to secure your digital device against Bluetooth attacks.
MITRE Att&ck Framework Part – 2 | Attack Tactics
MitreAtt&ck Tactics- means what are the adversary goals during attack. Tactic represents the underlying motive behind an ATT&CK technique. The MITRE ATT&CK framework has three different versions- • ATT&CK for Enterprise • ATT&CK for Mobile • ATT&CK for ICS
What is MITRE Att&ck Framework Basics
What are the adversaries, tactics, techniques, procedure (TTP) and common knowledge (CK)
This video explains role of confidentiality, integrity & availability – CIA Triad in Cyber Security. It covers under mentioned points-
Subscribe YouTube channel for future updates https://www.youtube.com/c/CyberPathshalaIndia
Mobile Data Leakage | Organization’s interest in your personal data | Important categories for Data Analysis
Get the detailed answers of questions on personal data leakage, theft of data. Why do Mobile Apps Steal Your Personal Data ? What is the interest of organizations in your personal data? How does your personal data gets leak?
What is masked aadhar ? How to Safegaurd from Aadhar Card Frauds!
Fraudsters trap innocent people by seeking details of their Aadhaar card through phone calls and emails and commit crime. This video explains the various features provided by the UIDAI (Unique Identification Authority of India) on its website along with some other preventive measures to protect the Aadhar card.
Biometric Lock/Unlock facility allows an Aadhaar card holder to lock and secure your aadhar card from financial frauds
Biometric Lock/Unlock facility allows an Aadhaar card holder to lock and temporarily unlock their biometrics. This facility aims to strengthen privacy and provides an added layer to secure Aadhar card from misuse by cyber fraudsters.
How to create virtual id in Aadhar in Hindi
VID can be used in place of Aadhaar number. A Virtual ID (VID) allows a user to go through the Aadhaar biometric ID verification process without exposing their 12-digit Aadhaar number to third parties. After the minimum validity period (currently set as 1 calendar day), on Aadhaar number holder requests regeneration, a new VID will be generated and the previous VID will be deactivated. In case resident opts for retrieval of VID, the last active VID will be sent to the Aadhaar number holder. Link to generate aadhar virtual id- https://myaadhaar.uidai.gov.in/genericGenerateOrRetriveVID
QR Code Payment Scam
To know the answers of above mentioned questions, watch this video –
Ethical Hacking & Common Myths
Webinar on Cyber Crime & Preventive Measures –
It was organized by the Shivaji College (Delhi University) to spread cyber crime awareness among the college students and faculties.