Posts

Showing posts with the label cybersecurity

What is deepfake and how to secure yourself from deepfake?

Image
Deepfake refers to the use of artificial intelligence (AI) and deep learning techniques to create or manipulate media content, often involving the substitution of a person's likeness in videos or images. The term "deepfake" is derived from the combination of "deep learning" and "fake." Deepfake technology uses deep neural networks, particularly generative adversarial networks (GANs), to generate realistic-looking content. GANs consist of two neural networks – a generator and a discriminator – that work together to create and evaluate synthetic data. In the context of deepfakes, the generator creates fake content, such as a video of a person saying or doing something they never did, while the discriminator tries to distinguish between real and fake content. Deepfakes can be created for various purposes, including entertainment, satire, or malicious activities. While they have potential positive applications, such as in the film industry for special e

Google Dorks or Google hacking

Image
  What is a Google Dork? Google dorking, also known as Google hacking, can return information that is difficult to locate through simple search queries. That description includes information that is not intended for public viewing but that has not been adequately protected.  A search parameter is a limitation applied to a search. Here are a few examples of advanced search parameters: site:  returns files located on a particular website or domain. filetype:  followed (without a space) by a file extension returns files of the specified type, such as DOC, PDF, XLS and INI. Multiple file types can be searched for simultaneously by separating extensions with “|”. inurl:  followed by a particular string returns results with that sequence of characters in the URL. intext:  followed by the searcher’s chosen word or phrase returns files with the string anywhere in the text. As a  passive attack  method, Google dorking can return usernames and passwords, email lists, sensitive documents, persona

What is a cyber attack?

🛑 What is a cyber attack? - A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage. Cyber attacks aim to disable, disrupt, destroy or control computer systems or to alter, block, delete, manipulate or steal the data held within these systems. - A cyber attack can be launched from anywhere by any individual or group using one or more various attack strategies. - People who carry out cyber attacks are generally regarded as cybercriminals. Often referred to as bad actors, threat actors and hackers, they include individuals who act alone, drawing on their computer skills to design and execute malicious attacks.