Forem

Deepak Sharma profile picture

Deepak Sharma

Cybersecurity enthusiast & tech writer, uncovering global trends and innovations to inspire a safer, smarter digital world

Location Dehradun, Uttarakhand Joined Joined on 
Insider Negligence: Accidental Security Breaches
Cover image for Insider Negligence: Accidental Security Breaches

Insider Negligence: Accidental Security Breaches

Comments
1 min read
Data Exfiltration: How Information Gets Stolen
Cover image for Data Exfiltration: How Information Gets Stolen

Data Exfiltration: How Information Gets Stolen

Comments
1 min read
Shadow IT: The Risk Companies Ignore
Cover image for Shadow IT: The Risk Companies Ignore

Shadow IT: The Risk Companies Ignore

Comments
1 min read
Session Timeout: Why It Matters for Security
Cover image for Session Timeout: Why It Matters for Security

Session Timeout: Why It Matters for Security

Comments
2 min read
Brute Force Attacks: Breaking Passwords Fast
Cover image for Brute Force Attacks: Breaking Passwords Fast

Brute Force Attacks: Breaking Passwords Fast

Comments
1 min read
Man-in-the-Middle Attacks: Silent Data Theft
Cover image for Man-in-the-Middle Attacks: Silent Data Theft

Man-in-the-Middle Attacks: Silent Data Theft

Comments
1 min read
API Security: The Weak Link in Apps
Cover image for API Security: The Weak Link in Apps

API Security: The Weak Link in Apps

Comments
1 min read
Token Theft: Stealing Active Sessions
Cover image for Token Theft: Stealing Active Sessions

Token Theft: Stealing Active Sessions

Comments
2 min read
Drive-by Downloads: Infection Without Action
Cover image for Drive-by Downloads: Infection Without Action

Drive-by Downloads: Infection Without Action

Comments
1 min read
Keyloggers: Every Keystroke Counts
Cover image for Keyloggers: Every Keystroke Counts

Keyloggers: Every Keystroke Counts

Comments
1 min read
Watering Hole Attacks: Hacking Trusted Sites
Cover image for Watering Hole Attacks: Hacking Trusted Sites

Watering Hole Attacks: Hacking Trusted Sites

Comments
1 min read
Clickjacking: Tricking You Into Clicking
Cover image for Clickjacking: Tricking You Into Clicking

Clickjacking: Tricking You Into Clicking

Comments
1 min read
Fileless Malware: Attacks Without Files
Cover image for Fileless Malware: Attacks Without Files

Fileless Malware: Attacks Without Files

Comments
1 min read
Evil Twin Wi-Fi: Fake Networks, Real Threats
Cover image for Evil Twin Wi-Fi: Fake Networks, Real Threats

Evil Twin Wi-Fi: Fake Networks, Real Threats

Comments
2 min read
DNS Spoofing: Redirecting You to Danger
Cover image for DNS Spoofing: Redirecting You to Danger

DNS Spoofing: Redirecting You to Danger

Comments
1 min read
Malvertising: Ads That Infect Your Device
Cover image for Malvertising: Ads That Infect Your Device

Malvertising: Ads That Infect Your Device

Comments
1 min read
Deepfake Scams: Trust Is Under Attack
Cover image for Deepfake Scams: Trust Is Under Attack

Deepfake Scams: Trust Is Under Attack

Comments
1 min read
Juice Jacking: Charging Ports That Steal Data
Cover image for Juice Jacking: Charging Ports That Steal Data

Juice Jacking: Charging Ports That Steal Data

Comments
1 min read
Shoulder Surfing: Offline Hacking Still Works
Cover image for Shoulder Surfing: Offline Hacking Still Works

Shoulder Surfing: Offline Hacking Still Works

Comments
1 min read
Metadata: The Data Behind Your Data
Cover image for Metadata: The Data Behind Your Data

Metadata: The Data Behind Your Data

Comments
1 min read
Credential Stuffing: When Old Leaks Hit Back
Cover image for Credential Stuffing: When Old Leaks Hit Back

Credential Stuffing: When Old Leaks Hit Back

Comments
1 min read
Browser Extensions: Hidden Security Risks
Cover image for Browser Extensions: Hidden Security Risks

Browser Extensions: Hidden Security Risks

Comments
1 min read
SIM Swap Fraud: How Your Number Gets Stolen
Cover image for SIM Swap Fraud: How Your Number Gets Stolen

SIM Swap Fraud: How Your Number Gets Stolen

Comments
1 min read
Session Hijacking: The Attack You Don’t Notice
Cover image for Session Hijacking: The Attack You Don’t Notice

Session Hijacking: The Attack You Don’t Notice

Comments
1 min read
Cybersecurity Is Everyone’s Responsibility
Cover image for Cybersecurity Is Everyone’s Responsibility

Cybersecurity Is Everyone’s Responsibility

Comments
1 min read
Unknown Links Are Always Dangerous
Cover image for Unknown Links Are Always Dangerous

Unknown Links Are Always Dangerous

Comments
1 min read
Digital Identity Theft Is Rising Fast
Cover image for Digital Identity Theft Is Rising Fast

Digital Identity Theft Is Rising Fast

Comments
1 min read
Every Click Can Be Tracked
Cover image for Every Click Can Be Tracked

Every Click Can Be Tracked

Comments
1 min read
Your Location Data Can Be Misused
Cover image for Your Location Data Can Be Misused

Your Location Data Can Be Misused

Comments
1 min read
Outdated Software Is a Security Risk
Cover image for Outdated Software Is a Security Risk

Outdated Software Is a Security Risk

Comments
1 min read
Free Downloads Can Cost You Privacy
Cover image for Free Downloads Can Cost You Privacy

Free Downloads Can Cost You Privacy

Comments
1 min read
Scammers Target Human Emotions
Cover image for Scammers Target Human Emotions

Scammers Target Human Emotions

Comments
1 min read
Cyber Awareness Is Your First Defense
Cover image for Cyber Awareness Is Your First Defense

Cyber Awareness Is Your First Defense

Comments
1 min read
Unsecured Devices Are Easy Targets
Cover image for Unsecured Devices Are Easy Targets

Unsecured Devices Are Easy Targets

Comments
1 min read
Your Email Is the Gateway to Everything
Cover image for Your Email Is the Gateway to Everything

Your Email Is the Gateway to Everything

Comments
1 min read
Weak Passwords Still Break Security
Cover image for Weak Passwords Still Break Security

Weak Passwords Still Break Security

Comments
1 min read
Social Media Is a Goldmine for Hackers
Cover image for Social Media Is a Goldmine for Hackers

Social Media Is a Goldmine for Hackers

Comments
1 min read
Data Breaches Happen Every Day
Cover image for Data Breaches Happen Every Day

Data Breaches Happen Every Day

Comments
1 min read
Fake Apps Can Steal Everything
Cover image for Fake Apps Can Steal Everything

Fake Apps Can Steal Everything

Comments
1 min read
Two-Factor Authentication Is No Longer Optional
Cover image for Two-Factor Authentication Is No Longer Optional

Two-Factor Authentication Is No Longer Optional

Comments
1 min read
Your Personal Data Is Already Online
Cover image for Your Personal Data Is Already Online

Your Personal Data Is Already Online

Comments
1 min read
Phishing Attacks Are Getting Smarter
Cover image for Phishing Attacks Are Getting Smarter

Phishing Attacks Are Getting Smarter

Comments
1 min read
Public Wi-Fi Can Expose Your Data
Cover image for Public Wi-Fi Can Expose Your Data

Public Wi-Fi Can Expose Your Data

Comments
1 min read
Password Reuse Is Your Biggest Risk
Cover image for Password Reuse Is Your Biggest Risk

Password Reuse Is Your Biggest Risk

Comments
1 min read
The App That Can Drain Your Bank Account in Seconds
Cover image for The App That Can Drain Your Bank Account in Seconds

The App That Can Drain Your Bank Account in Seconds

Comments
1 min read
How Hackers Pretend to Be You Online
Cover image for How Hackers Pretend to Be You Online

How Hackers Pretend to Be You Online

Comments
1 min read
The Email Subject Line That Should Scare You
Cover image for The Email Subject Line That Should Scare You

The Email Subject Line That Should Scare You

Comments
1 min read
Stop Using This Common Password Trick
Cover image for Stop Using This Common Password Trick

Stop Using This Common Password Trick

Comments
1 min read
How to Check If Your Data Is Already Leaked
Cover image for How to Check If Your Data Is Already Leaked

How to Check If Your Data Is Already Leaked

Comments
1 min read
This One Setting Makes You Easy to Hack
Cover image for This One Setting Makes You Easy to Hack

This One Setting Makes You Easy to Hack

Comments
1 min read
The Secret Risks of Bluetooth You Never Knew
Cover image for The Secret Risks of Bluetooth You Never Knew

The Secret Risks of Bluetooth You Never Knew

Comments
1 min read
How Hackers Guess Your Password Just by Looking at You
Cover image for How Hackers Guess Your Password Just by Looking at You

How Hackers Guess Your Password Just by Looking at You

Comments
1 min read
Never Do This Online at Night
Cover image for Never Do This Online at Night

Never Do This Online at Night

Comments
1 min read
Where Your Deleted Photos Actually Go
Cover image for Where Your Deleted Photos Actually Go

Where Your Deleted Photos Actually Go

Comments
1 min read
Is Your Phone Sharing Your Location Right Now?
Cover image for Is Your Phone Sharing Your Location Right Now?

Is Your Phone Sharing Your Location Right Now?

Comments
1 min read
The Fastest Way Hackers Break Into Accounts
Cover image for The Fastest Way Hackers Break Into Accounts

The Fastest Way Hackers Break Into Accounts

Comments
1 min read
How Fake Customer Support Scams Really Work
Cover image for How Fake Customer Support Scams Really Work

How Fake Customer Support Scams Really Work

Comments
1 min read
The New Cybercrime Trend Nobody Is Talking About
Cover image for The New Cybercrime Trend Nobody Is Talking About

The New Cybercrime Trend Nobody Is Talking About

Comments
1 min read
If You See This Notification, Act Immediately
Cover image for If You See This Notification, Act Immediately

If You See This Notification, Act Immediately

Comments
1 min read
Your Lock Screen Could Be Your Weakest Point
Cover image for Your Lock Screen Could Be Your Weakest Point

Your Lock Screen Could Be Your Weakest Point

Comments
1 min read
loading...