Cyber Security Awareness Is About Both Knowing And Doing

August 8, 2016 - 23rd cybersecurity awareness program at Davi Higher Secondary School, Birtamode Jhapa which is one of the prominent management school and college or great college In Jhapa district. The...
Trump administration wants to use Americans’ smartphone location data to help track

How The Cell Phones Of Spring Breakers Who Flouted Coronavirus Warnings Were Tracked

April 06, 2020, Kathmandu The Trump administration has focused on tracking the spread of coronavirus since its global outbreak. For this purpose, it wants to use America’s smartphone location data in order...
Tag Tracker Hacked

Apple Air Tag Tracker Hacked and Reprogrammed by a Security Researcher

17th May 2021, Kathmandu Apple Air Tag may have some security matters that could be exploited by hackers to modify the firmware of the device. Apple had released the Air Tag last...

7 Tips for Implementing a Personnel Security Program

17th October 2021, Kathmandu For what reason does it appear to be that probably the main things in life are regularly those that are the most ignored? For instance, a Personnel Security...

Finance Minister Said: NRB To Alert Regarding Cybersecurity Issues

Thursday, September 6, 2019, Kathmandu After six days since the Chinese hackers looted crores of rupees from various banks by designing fake visa cards, Finance Minister Dr. Yuvraj Khatiwada has talked about...
Cobalt Application Security Platform

Cobalt Application Security Platform, Pentest as a Service

16th April 2021, Kathmandu Cobalt, a Pentest as a Service (PtaaS) platform that simplifies the security and compliance needs of DevOps-driven teams with workflow integrations and high-quality talent on-demand. Cobalt offers a...
Malvertising Mayhem

Everything You Need to Know About the Malvertising Mayhem

Everything You Need to Know About the Malvertising Mayhem What is Malvertising? Malvertising is a pet name for malware that’s delivered through online advertising techniques. The ads look authentic. Often, legitimate third-party marketing companies distribute...
NRB's Cyber Resilience Guidelines

NRB’s Cyber Resilience Guidelines: Safeguarding the Payment Sector in Nepal

1st September 2023, Kathmandu Rastra Bank's Payment Systems Department has taken a proactive step by introducing a comprehensive set of guidelines called the "NRB's Cyber Resilience Guidelines." These guidelines are tailored to authorized...

Android 5.0 Lollipop Is Set To Roll Out To The Sony Xperia Z3

Sony announced a brand new Xperia Z3 smartphone on September 2014 which was released the same month that comes up with an Android OS v4.4.4 (KitKat) up-gradable up to v5.0.2 (Lollipop)...

Specialize In Information Security And Ethical Hacking Courses

Information is an important means for the growth and success of every organization. Keeping the information and vital data secure is the main duty of every employee in the company in...

Guar Of National Breach Highlights The Risk Of Accidental Data

As the use of an employee-owned device is increased in the enterprise, the risk of accidental data disclosure through apps and services that are outside the control of that enterprise such as emails, social...

Researchers Discover a Serious Security Flaw in 5G Network

4th July 2019 Kathmandu Many places in Nepal still don’t have proper access to the fourth generation of networks (4G). However, this doesn’t stop the world-renowned communication companies to develop, test and...
Sneaky Phishing Attack

Microsoft Warned about an Alert Over Sneaky Phishing Attack

3rd August 2021, Kathmandu Microsoft has issued an alert about a crafty phishing attack. Microsoft's Security Intelligence team has issued an alert to Office 365 users and administrators to watch out for a...

What Exactly Is Security Information Management (SIM) ?

Security information management(SIM) is an industry terminology that is related to information security relating to the gathering of data mainly log files into a central memory for trend analysis. Generally, SIM products...
Google To Release Your location Data To Help Fight Coronavirus Pandemic

Google To Release Your location Data To Help Fight Coronavirus Pandemic

April 06, 2020, Kathmandu What exactly is Google capable of? What better time than a global pandemic - to really give the world a clear glimpse of Google's capability. Google is publicly...
Cybercriminal Groups Target Online Payment Processing Systems

Online Payment System Targeted By Cyber Criminals

April 10, 2020, Kathmandu, Nepal Doing everything online might be the easiest and efficient way of life, but it surely is not the safest. With the increasing number of cybercrimes, there are...
instagram antibullying

Instagram Has a New Plan to Strengthen its Anti-bullying Feature

8th April 2021, Kathmandu Instagram – a social media platform that is preparing to launch a new feature that will strengthen its anti-bullying feature. These new features may be an AI device. This...
Tesla Employee

Tesla Employee Turns Down $1 Million, Avoids a Cyberattack Bump

29th August 2020, Kathmandu Earnest employee saves the day and prevents a major cyber attack at Tesla. A Tesla employee turned down an offer worth $1 Million and helped the FBI arrest a...
Steal Crypto Wallets

OpenSea NFT Marketplace Bug Allows Hackers to Steal Crypto Wallets

16th October 2021, Kathmandu In the course of recent weeks, a few instances of lost crypto wallets have been accounted for and tweeted via online media stages. Clients have been grumbling around...
Security vulnerabilities of Apple Iphone Os

Apple iPhone 11 Series Ships With A Security Flaw: Here Are The Details

22 September, Kathmandu Only a few days have passed since brand-new iPhone 11, iPhone 11 Pro and iPhone Pro Max have been released, and security researchers have already detected some flaws in the...

Which Security Control Is The Hacker Affecting ?

A security contravention is an event that leads to unauthorized access of data, files, services, or the device itself. The nature of the incident or the level of the breach can...
Snoop with Kali Linux

How to Snoop With Kali Linux on Bluetooth Contrivances

10th October 2021, Kathmandu Bluetooth has become a major component of our lives. Bluetooth contrivances are utilized every day by many individuals around the globe. Most of them, though, have no conception...
Shiny Hunters Cyber Crime Group

Researchers Detail Modus Operandi of Shiny Hunters Cyber Crime Group

25th August 2021, Kathmandu ShinyHunters, a notorious cybercriminal underground group that's been on a knowledge breach spree since last year, has been optically canvassed probing companies' GitHub repository ASCII text file for susceptibilities which will be abused to...
Cyber Saviour

Explore The Ultimate Journey in Cybersecurity and Digital Forensics

27th August 2022, Kathmandu People who work with digital forensics in information security are on the front lines of the fight against cybercrime. People who collect, process, preserve, and analyze computer-related evidence. They...

Building Secure Data Access,Threats And Countermeasures

The network security contains the policies taken to monitor and prevent misuse, access, modification or denial of a network accessible resources and computer network. Network security includes the authorization of access...

CyberSecurity Awareness For Gauradaha Jhapa Students

61st Cyber Security Awareness Program for School Chaun High School Gauradaha Jhapa, Nepal sponsored by Nurse Manju Sangraula, Virginia USA. Bishnu Priya Rijal (DCnepal.com) Chitwan, Nepal, January 28, 2017 - Cyber...
Cybersecurity Compliance

Companies Can Find the “X” Factor For Cybersecurity Compliance

11th April 2021, Kathmandu Cybersecurity threat, a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include computer viruses, data breaches, Denial of Service...

Best Ways To Secure Your Stored Data

The data-eccentric security is a method of protection that gives high preference to the safety of data and information instead of the security of servers, networks or applications. The data-eccentric security...

5 Safety Tips While Using Social Media That Saves You More

The 21st century has been tech savvy. Digitization all over the world has made human to move into different mediums like social media, websites, and email to share the information. Moving...
Russia Critical Sectors

Russia’s Critical Sectors Under APT Group ChamelGang’s Radar

10th October 2021, Kathmandu The assault vector of Russian state-supported progressed diligent danger (APT) assailants is stretched out across different nations. Various cybercriminal bunches from Russia have designated a few worldwide basic...