Articles

  • Jan 23, 2025 | mdpi.com | Kashan Fayyaz |Muhammad Shahzaib |Arslan Aziz |Muhammad Irfan

    All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess.

  • Dec 9, 2024 | medium.com | Muhammad Shahzaib

    Muhammad Shahzaib·Follow3 min read·--While technology has been crucial in safeguarding against ransomware, phishing, and malware, human error is normally the weakest link. Social engineering uses psychological tricks to get people to release private information or take actions that menace security. People and organizations must understand social engineering and how to be wary of it. This article will discuss social engineering techniques, the impact of these attacks, and risk mitigation techniques.

  • Dec 2, 2024 | medium.com | Muhammad Shahzaib

    Muhammad Shahzaib·Follow4 min read·--The Internet of Things completely changed the way networks, systems, and objects work by changing the face of daily life and changing entire businesses. This, however, means that even the more connections, the higher the prospect of being under cyberattacks, while what worries people, businesses, and governments is rather high IoT security.

  • Dec 1, 2024 | medium.com | Muhammad Shahzaib

    Muhammad Shahzaib·Follow3 min read·--In this era of increased cyber threats, stronger ways of securing digital assets are in demand among organizations. Penetration testing is one of the best methods to evaluate and improve cybersecurity. Penetration testing commonly known as ethical hacking or pen testing helps to identify areas where a malicious hacker may attack them.

  • Nov 29, 2024 | medium.com | Muhammad Shahzaib

    Muhammad Shahzaib·Follow3 min read·--This digitizing world requires cybersecurity as one of the available ways of the present day in the management system of an organization. In that, it should implement adequate controls regarding risks relevant to cyber world change from a perspective of security while protecting resources, information, and reputation.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →