How to Remove Malware

Adware, Trojans, and Ransomware Oh My! If you use a computer, read the newspaper, or watch the news, you will know about computer viruses or other malware. These are those malicious programs that once they infect your machine will start causing havoc on your computer….

Free Azure Microsoft Certifications Exams

And no this is not a scam nor a, umm scam. Yes, Microsoft is on a roll giving out free certs. How you may ask? Just do the following Register for the Microsoft Azure Virtual Training Day sessions being advertised all over the internet. Yus…

New ideas…

Side note as I have not posted anything in a while. So this year I have switched tactics. Or rather changed jobs in January this year. I am now working for UK based ERP implementation company in Stellenbosch. Why? Because I wanted to widen my…

New features coming to Android

1. Keep your accounts safe with Password Checkup on Android Password Checkup notification screen On Android, you can save passwords to your Google account, making it quicker and easier to sign into your apps and services using Autofill. Your login credentials are one of your…

Spotify Hit With Another Credential-Stuffing Attack

This marks the second credential-stuffing attack to hit the streaming platform in the last few months. Spotify suffered a credential-stuffing attack that used stolen credentials from some 100,000 user accounts, a security researcher discovered.  This is the second credential-stuffing attack to affect the music platform…

Anatomy of an APT Attack: Step by Step Approach

This article will explore the technique, design and inner workings of an APT (Advanced Persistent Threat) attack. It will also relate various stages of attack with a few attacks that were custom-created to penetrate enterprises for extraction of internal data, trade secrets, and sensitive business…

Top 25 Threat Actors

Today, hacking – in whatever form you choose to label it (cybercrime, threat actors, espionage, etc.) – is modern warfare or big business; sometimes both. Some hacking groups, aka “threat actors,” have stood out by their actions, their longevity, their methods, or a combination of…

Site Update

My site is slowly coming up even tough I had a few glitches here and there. Setting it up is time-consuming as I am not only working but studying as well. But I will get there. Doing this at night around 11 pm is not…

Tips for staff Working Remotely

As we all start the Working From Home trend, all employees are responsible for the company cybersecurity. This is not just the IT and security team’s responsibility to keep data safe — every employee of the organization needs to be involved. Weak or stolen passwords…

Hello!

Welcome to my personal website where I will try to blog anything about me and some IT bits and pieces. My thought process and anything I want to share