Is the WannaCry Ransomware Attack dangerous to your network?

Ransomware is a form of malware that encrypts a user’s data and demands a ransom in exchange for the encryption key. Early versions of this type of malware usually said “Your files have been encrypted!” and then would say “Please send US $300 or €300 or 3 Bitcoin” with instructions on how to pay for […]

Are you worried about unknown SMS Scams? phishing scams explained ( Smishing )

Are you accustomed to the crime of stealing sensitive information? Even if you don’t know the details, most of us have heard it once – an unexpected email that seems harmless at first but doesn’t seem right at first glance. These emails are sent by cybercriminals and usually contain malware or malicious attachments that, if […]

Internet Control Message Protocol (ICMP)

What is the Internet Control Message Protocol (ICMP)? Internet Control Message Protocol (ICMP) is a protocol used by networks to communicate problems with data transmission. In this definition of ICMP, one of the main ways ICMP is used is to determine whether the data reaches its destination and at the right time. This makes ICMP […]

How a computer can be infected and be part of a DDoS botnet

In computer use, a zombie is a computer connected to a network that has been compromised by a virus, virus, or Trojan. It can be used remotely for malicious activities. Most owners of zombie computers do not realize that their system is used in this way, which is why they are compared to the living […]

OSI Model: 7 layers of network protocol

The OSI reference model consists of seven different layers and is the first standard model of network communication. It’s implemented by all primary computer and telecommunications companies OSI is a conceptual model developed by the International Organization for Standardization that enables various communication methods to communicate using standard protocols. Although not comprehensive, the simple TCP/IP […]