Checkout π
πPHASES OF HACKING
http://unkowncave.ezyro.com/2021/07/03/phases-of-hacking/
#share & #supportus
~ @geekcode
πPHASES OF HACKING
http://unkowncave.ezyro.com/2021/07/03/phases-of-hacking/
#share & #supportus
~ @geekcode
What is Vishing?
Vishing is a type of attack used by hackers to trick potential victims into divulging their sensitive, personal and confidential information over the phone.Although a voice phishing attack may look like an old-fashioned scam, it can also involve automated voice simulation technology.
Some common Examples of Vishing:
πΈ Tech support fraud
πΈ Telemarketing fraud
πΈ Bank or credit card fraud
πΈ Government impersonations
For query : @geekserverbot
~ @geekcode
Vishing is a type of attack used by hackers to trick potential victims into divulging their sensitive, personal and confidential information over the phone.Although a voice phishing attack may look like an old-fashioned scam, it can also involve automated voice simulation technology.
Some common Examples of Vishing:
πΈ Tech support fraud
πΈ Telemarketing fraud
πΈ Bank or credit card fraud
πΈ Government impersonations
For query : @geekserverbot
~ @geekcode
How to Prevent Vishing Attacks?
Voice phishing attack take place when a person or an AI place a phone call to a potential victim using the guise of an emergency or sense of urgency to confirm your details or identity. During the attack, the attacker can also ask for more information from you. Voice phishing attacks may not always be a negative situation. It can also be news that you potentially won gifts, money, trips, etc.
The major reason for a vishing simulation is to get information like personally identifiable information (PII), medical information, or other sensitive data that can be used to commit identity theft and fraud. The scammer will want you to give the information to them over the phone quickly before you even realize that you are being scammed, hence the reason for urgency.
~ @geekcode
Voice phishing attack take place when a person or an AI place a phone call to a potential victim using the guise of an emergency or sense of urgency to confirm your details or identity. During the attack, the attacker can also ask for more information from you. Voice phishing attacks may not always be a negative situation. It can also be news that you potentially won gifts, money, trips, etc.
The major reason for a vishing simulation is to get information like personally identifiable information (PII), medical information, or other sensitive data that can be used to commit identity theft and fraud. The scammer will want you to give the information to them over the phone quickly before you even realize that you are being scammed, hence the reason for urgency.
~ @geekcode
#CyberTalk #HackingTip
Why networking is important?
Networking is really important to understand in cyber security. From scanning and identifying who and what is on a network, to reviewing network logs to monitor and track what users have been up to will require you to have an understanding of how networks work.
~ @geekcode
Why networking is important?
Networking is really important to understand in cyber security. From scanning and identifying who and what is on a network, to reviewing network logs to monitor and track what users have been up to will require you to have an understanding of how networks work.
~ @geekcode
#ProgrammingTip
Best trendy ways to improve your programming skills & knowledge β‘
πTaking a free or paid online programming course.
πReading a programming book
Picking a personal project and hacking away to learn as you code.
πFollowing along with an online tutorial project.
πKeeping up to date with relevant programming blogs.
For query : @geekserverbot
~ @geekcode
Best trendy ways to improve your programming skills & knowledge β‘
πTaking a free or paid online programming course.
πReading a programming book
Picking a personal project and hacking away to learn as you code.
πFollowing along with an online tutorial project.
πKeeping up to date with relevant programming blogs.
For query : @geekserverbot
~ @geekcode
Creating a powerful Android app context protector with Frida and r2
https://docs.google.com/presentation/d/1BktWJ91ill5iI_-ENzh2Uq14BGIHxxpONzNYybYJIC4/
~ @geekcode
https://docs.google.com/presentation/d/1BktWJ91ill5iI_-ENzh2Uq14BGIHxxpONzNYybYJIC4/
~ @geekcode
Google Docs
Creating a powerful protector with frida
Creating a powerful Android app context protector With frida and r2 Giovanni - iGio90 - Rocca @Ultrapowa | @Defunct | @Bha | @Pepper | @VeronicaPabloOsorio m0lecon 2020
2570+ book downloads by our bot @geekcodevipbot
Thanks to all of you guys β€οΈ
Such a great number for us β¨
Support our channel after 3k subscribers we will publish our 2nd part as physical/hard copy at your doorstep β€οΈ
~ @geekcode
Thanks to all of you guys β€οΈ
Such a great number for us β¨
Support our channel after 3k subscribers we will publish our 2nd part as physical/hard copy at your doorstep β€οΈ
~ @geekcode
Have You Guys Ever Heard About FAT32 & NTFS?
IF NOT SO CHECKOUT THIS π
https://telegra.ph/What-is-FAT32--NTFS-07-16
IF NOT SO CHECKOUT THIS π
https://telegra.ph/What-is-FAT32--NTFS-07-16
Telegraph
What is FAT32 & NTFS?
I think you guys never hear these two terms FAT32 and NTFS, or at least never cared enough to find out what they are, but they are file systems. When you format your hard drive, you can choose whether to format it using FAT32 or NTFS. They both have prosβ¦