EH Academy Blog

Inside Out of the Academy

Top 4 Holiday Season Phishing Scams

The holiday season is the golden period for the hackers around the world. They target the online shoppers and other online consumers to gain their financial details. A hacker takes advantage of the increased shopping when things get busy. Mostly on the holiday season, the online customers rush to...

READ MORE

How Artificial Intelligence is enabling Robots to Predict Actions?

As technology is evolving, we can see that how our future is revolving around robots. Robots are being made to automate the activities where human life is considered in danger. The idea is to replace human with robots where the task is more critical and requires more accuracy. But, many firms are...

READ MORE

How to become Anonymous online (TOR, Kali Linux & Whonix)

Ever wonder how the hackers hide their identity? Or how come they are able to defeat the law enforcement agencies? TOR, VPN and etc right? But, still how to do it correctly because a misconfigure system can reveal much more information than you can ever imagine. This article is the answer of...

READ MORE

Internet of Thing goes Out of Control

For a decade or more, people have been promised a future filled with smart technologies like air condition that turn on from remote locations and smart sensors that sends desired data to us or perform some task. To a huge extent, we have fulfilled this need by introducing many smart sensors and...

READ MORE

The Top Upcoming Targets for Ransomware

Unlike other campaigns, financially motivated cyber threats, like ransomware campaigns, do not care about the individual target or after effects of their activities. Instead, they target the easiest target that is more likely to pay ransom demand. Ransomware is a highly effective technique...

READ MORE

8 steps for Startups to Adequately Protect against cyber attacks

Millions of people get affected by malicious programs and files every day. This cost organizations and individual the loss of sensitive data through a variety of deceptions, including Phishing scams, system flaw attacks and stolen employee or contractor credentials. According to the National...

READ MORE

The Hackers and Computer Predators

A threat is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm. Sometimes, employees and users create threats for their organizations by not following and performing secure computer practices. People, not computers, create computer threats....

READ MORE

5 Security Practices that Create Hurdles for Hackers

Majority of hackers believes that no password is secured from them, whether white hats or black hats. There are many hackers that are working to help and report vulnerabilities they found for the government, law enforcement, intelligence and military. Although organizations are working towards...

READ MORE

5 Cyber Security Mistakes Organizations must Avoid

The companies whether enterprise, small businesses or startups, are either based online or have different services online for their customers. And the reality is, just by conducting businesses online, they are threatened by cyber crime. A single incident can cause loss of trust from customer and...

READ MORE

Locating ISIS & other Threats using OSINT for Dummies

Information does not need to be secret to be valued. The information that we access every day is somehow valuable to us in different manners. It’s up to us that how we make the most of it. The blogs we browse, the broadcasts we watch, business websites, videos, social networks, forums or the...

READ MORE