EH Academy Blog

Inside Out of the Academy

How to become Anonymous online (TOR, Kali Linux & Whonix)

Ever wonder how the hackers hide their identity? Or how come they are able to defeat the law enforcement agencies? TOR, VPN and etc right? But, still how to do it correctly because a misconfigure system can reveal much more information than you can ever imagine. This article is the answer of...

READ MORE

Internet of Thing goes Out of Control

For a decade or more, people have been promised a future filled with smart technologies like air condition that turn on from remote locations and smart sensors that sends desired data to us or perform some task. To a huge extent, we have fulfilled this need by introducing many smart sensors and...

READ MORE

The Top Upcoming Targets for Ransomware

Unlike other campaigns, financially motivated cyber threats, like ransomware campaigns, do not care about the individual target or after effects of their activities. Instead, they target the easiest target that is more likely to pay ransom demand. Ransomware is a highly effective technique...

READ MORE

8 steps for Startups to Adequately Protect against cyber attacks

Millions of people get affected by malicious programs and files every day. This cost organizations and individual the loss of sensitive data through a variety of deceptions, including Phishing scams, system flaw attacks and stolen employee or contractor credentials. According to the National...

READ MORE

The Hackers and Computer Predators

A threat is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm. Sometimes, employees and users create threats for their organizations by not following and performing secure computer practices. People, not computers, create computer threats....

READ MORE

5 Security Practices that Create Hurdles for Hackers

Majority of hackers believes that no password is secured from them, whether white hats or black hats. There are many hackers that are working to help and report vulnerabilities they found for the government, law enforcement, intelligence and military. Although organizations are working towards...

READ MORE

5 Cyber Security Mistakes Organizations must Avoid

The companies whether enterprise, small businesses or startups, are either based online or have different services online for their customers. And the reality is, just by conducting businesses online, they are threatened by cyber crime. A single incident can cause loss of trust from customer and...

READ MORE

Locating ISIS & other Threats using OSINT for Dummies

Information does not need to be secret to be valued. The information that we access every day is somehow valuable to us in different manners. It’s up to us that how we make the most of it. The blogs we browse, the broadcasts we watch, business websites, videos, social networks, forums or the...

READ MORE

Why Cybercriminal Seeks Medical Data?

Nowadays, data stolen from banks and other financial institutions become useless once the breach is discovered and passwords are changed. But the data from healthcare firms and industries that include both personal identities and histories can live for a lifetime. Earlier this year, a hospital...

READ MORE

Adopting Security Habits From highly Secure Companies

Large organizations are highly concerned with their security policies and strategies to make their business a great success. For that they plan each and every thing prior with complete management and take some serious steps to make full proof security plans. Nowadays, security plan is highly...

READ MORE