keycybr

Follow keycybr
Share on
Copy link to clipboard

Welcome to keycybr "They want what you have got, don't give it to them" "Think before post" Well in this podcast you will get familiar with cyber security domain. Cyber crime is on the rise hence, we have to be alert and aware about cyber security threats

keycybr


    • Apr 25, 2021 LATEST EPISODE
    • infrequent NEW EPISODES
    • 9m AVG DURATION
    • 39 EPISODES


    Search for episodes from keycybr with a specific topic:

    Latest episodes from keycybr

    CYBER SECURITY TECHNOLOGIES FOR YOUR BUSINESS

    Play Episode Listen Later Apr 25, 2021 10:49


    Cyber Security or information technology Security is a field within information technology involving the protection of computer systems and the prevention of unauthorized use or changes or access of electronic data. ... It also protects computer systems from theft or damage.

    COMMON TYPES OF CYBER ATTACKS

    Play Episode Listen Later Apr 25, 2021 11:20


    Blocks access to key components of the network (ransomware) Installs malware or additional harmful software. Covertly obtains information by transmitting data from the hard drive (spyware) Disrupts certain components and renders the system inoperable.

    2021 CYBER SECURITY PREDICTIONS

    Play Episode Listen Later Apr 25, 2021 16:50


    The global market for cybersecurity software is predicted to grow from $183.2 billion in 2019 to $230 billion in 2021, attaining a 12% CAGR in the forecast period.

    CYBER SECURITY TRENDS FOR 2021

    Play Episode Listen Later Apr 25, 2021 11:33


    With AI being introduced in all market segments, this technology with a combination of machine learning has brought tremendous changes in cybersecurity. ... AI-enabled threat detection systems can predict new attacks and notify admins for any data breach instantly, making it the next cyber security trend in 2021

    WHAT PARENTS NEED TO KNOW ABOUT IT : LIVE ME APPLICATION

    Play Episode Listen Later Jul 30, 2020 9:25


    Live.me is a social network for broadcasting live video. Users of this application can broadcast videos from their own Android devices as well as watch broadcasts from other users, leaving comments and likes in real time. ... Each time you broadcast something, you'll earn coins and experience that you can use to level up.

    ROMANCE SCAM

    Play Episode Listen Later Jul 30, 2020 13:40


    A romance scam is a confidence trick involving feigning romantic intentions towards a victim, gaining their affection, and then using that goodwill to commit fraud.

    SECURITY CHALLENGES DURING THE COVID LOCKDOWN

    Play Episode Listen Later Jul 30, 2020 11:41


    Security Challenges in the New Working Reality ... Information Security outbreaks are no different and only proactive measures 

    LINKEDIN JOB SCAMS

    Play Episode Listen Later Jul 27, 2020 7:51


    LinkedIn users' sensitive information by sending out bogus job ... Some of these scams are very sophisticated, and are carried out 

    JOB SCAMS

    Play Episode Listen Later Jul 27, 2020 11:18


    To trick people looking for honest work, scammers advertise where real employers and job placement firms do. They also make upbeat promises about your chances of employment, and virtually all of them ask you to pay them for their services before you get a job. ... If you have to pay for the promise, it's likely a scam.

    CYBER PORNOGRAPHY

    Play Episode Listen Later Jul 27, 2020 12:42


    Internet pornography is any pornography that is accessible over the Internet, primarily via websites, peer-to-peer file sharing, or Usenet newsgroups. The availability of widespread public access to the World Wide Web in late 1990s led to the growth of Internet pornography. 

    WHAT ARE CYBER THREATS & WHAT TO DO ABOUT THEM

    Play Episode Listen Later Jul 24, 2020 16:20


    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber attacks include threats like computer viruses, data breaches, and Denial of Service (DoS) attacks.

    MAN IN THE MIDDLE ATTACK

    Play Episode Listen Later Jul 9, 2020 11:09


    In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other.

    USING PAYTM? THESE PAYTM SCAMS COST YOU IN LAKHS!!

    Play Episode Listen Later Jul 6, 2020 9:16


    This kind of Paytm scam involves the victim getting an SMS or email, asking them to update their Know Your Customer (KYC) details on Paytm or their account would be blocked. ... Then the scammer asks the victim to transfer an amount as little as Re 1 to validate whether the KYC process has been completed.

    ONLINE DATING SAFETY TIPS

    Play Episode Listen Later Jun 23, 2020 14:37


    You're contacted online by someone who appears interested in you. He or she may have a profile you can read or a picture that is emailed to you. For weeks, even months, you may chat back and forth with one another, forming a connection. You may even be sent flowers or other gifts. But ultimately, it's going to happen; your new-found “friend” is going to ask you for money.

    HOW TO HANDLE & PREVENT ONLINE HARRASSMENT

    Play Episode Listen Later Jun 7, 2020 12:54


    Internet harassment, also referred to as “ cyberbullying”, is the term used to describe the use of the Internet to harass, threaten, or maliciously embarrass.

    CYBER LAW IN INDIA

    Play Episode Listen Later Jun 7, 2020 11:52


    Cyber Laws of India. In Simple way we can say that cyber crime is unlawful acts wherein the computer is either a tool or a target or both. 

    BOIS LOCKER ROOM

    Play Episode Listen Later Jun 6, 2020 7:04


    Bois Locker Room was an Instagram scandal, allegedly involving a chat room of teenage boys from Delhi. It was started on 3 May 2020, when a member leaked chats from the group, including obscene images of around 15 girls. 

    CYBER BULLYING

    Play Episode Listen Later Jun 6, 2020 12:27


    Cyberbullying or cyberharassment is a form of bullying or harassment using electronic means. Cyberbullying and cyberharassment are also known as online bullying. It has become increasingly common, especially among teenagers, as the digital sphere has expanded and technology has advanced. 

    SIM SWAP FRAUD

    Play Episode Listen Later May 30, 2020 9:11


    A SIM swap scam (also known as port-out scam, SIM splitting, and simjacking, SIM swapping) is a type of account takeover fraud that generally targets a weakness in two-factor authentication and two-step verification in which the second factor or step is a text message (SMS) or call placed to a mobile telephone.

    SEXTING

    Play Episode Listen Later May 30, 2020 10:47


    Sexting is sending, receiving, or forwarding sexually explicit messages, photographs, or images, primarily between mobile phones, of oneself to others. It may also include the use of a computer or any digital device.

    CYBER SAFETY FOR WOMENS

    Play Episode Listen Later May 28, 2020 5:31


    We often use the internet for  research or as means of communication or entertainment. In order to ensure we remain safe while surfing the internet, it is important to discuss openly the best practices for surfing the internet.Few best practices are delineated hereinbelow:-

    ZOOM SECURITY & PRIVACY

    Play Episode Listen Later May 28, 2020 11:22


    With so much use, Zooms flaws came rapidly to light, The company handled the tremendous increase of workload seamlessly & quickly reacted to security researcher's discoveries. However, just like with each & every service, code updates will not address every complaint, but some issues are very much worth keeping in mind. So, here I introduced 10 security & privacy tips for zoom users.

    Techno - voyerism : laws to protect dignity of women

    Play Episode Listen Later Apr 8, 2020 5:24


    Electronic harassment is a new category of threatening behaviour in the work place. The offenders misuse corporate resources to harass co-workers, invade their privacy and even track their whereabouts. Everyone who receives email or uses the internet is susceptive to electronic harassment.

    Mobile is safe if you have USB CONDOM

    Play Episode Listen Later Apr 8, 2020 4:54


    Everyone knows how important it is to have a mobile in today's busy life. People consider their life incomplete without mobile. Whenever the mobile battery is down, it seems that life has stopped. Mobile batteries are charged in homes. There is no problem outside as USB ports are provided for mobile charging facilities at airports, stations, hotels, public restrooms, shopping centres and elsewhere. We connect our mobile to it and start charging the battery.

    Everything You Need To Know About Cyber Law

    Play Episode Listen Later Apr 4, 2020 8:26


    Cyber law does not define message..It defines information.

    Laws to safeguard women against cyber crimes in India

    Play Episode Listen Later Apr 2, 2020 9:41


    An unfortunate number of women are becoming victims of cyber crimes. According to a recent study more women are known to use the Internet to enrich their relationships compared to men. Young women, those 18-24, experience certain severe types of harassment at disproportionately high levels: 26% of these young women have been stalked online, and 25% were the target of online sexual harassment. The growing reach of the Internet and the rapid spread of information through mobile devices has presented new opportunities that could put some women at risk, so it's important to be mindful of the dangers.

    Access your password from anywhere with google password manager

    Play Episode Listen Later Mar 28, 2020 4:11


    Did you know Google has its own dedicated password manager? It's more than just password-syncing built into the Chrome browser .Google's solution also offers a web app, mobile apps, deep integration with Android, and automatic generation of strong passwords.    

    Questions to help parents start a conversation with your child about online safety

    Play Episode Listen Later Mar 27, 2020 4:04


    The digital parent is one who uses one or more of digital media applications/devices in his/her daily activities, particularly parenting. Digital parents play a key role in shaping how their children use the digital media; the parent being perhaps the first and most important mediator of digital use of children.

    Is Tiktok is safe for kids?

    Play Episode Listen Later Mar 22, 2020 6:59


    How safe is TikTok? Using any social network can be risky, but it's possible for kids to safely use the app with adult supervision (and a private account). When you sign up for TikTok, your account is public by default, meaning anyone can see your videos, send you direct messages, and use your location information.

    How to file cyber complaint in India

    Play Episode Listen Later Mar 19, 2020 10:17


    Cyber Crime Portal - https://www.cybercrime.gov.in

    Digital Evidence

    Play Episode Listen Later Mar 13, 2020 7:34


    Digital evidence is defined as information and data of value to an investigation that is stored on, received or transmitted by an electronic device. This evidence can be acquired when electronic devices are seized and secured for examination. Digital evidence: Is latent (hidden), like fingerprints or DNA evidence.

    "Snapchat" a popular app for teens but with dark side

    Play Episode Listen Later Mar 4, 2020 4:02


    Though there's nothing inherently dangerous about Snapchat, it's often referred to as “the sexting app.” There's no research showing that's true and plenty of anecdotal evidence that it isn't the focus for teens, but—like any media-sharing service—Snapchat can be used for sexting, harassment, etc.

    Coronavirus "safety measures" email is a phishing scam

    Play Episode Listen Later Mar 3, 2020 5:39


    Sadly, cybercrooks love a crisis, because it gives them a believable reason to contact you with a phishing scam

    Skull Breaker Challenge

    Play Episode Listen Later Mar 3, 2020 3:04


    Social media challenges are popular but often pose threats to those who choose to participate. The latest is the Skull Breaker .

    How important is to educate people about cyber security

    Play Episode Listen Later Feb 16, 2020 7:20


    Cybersecurity is important because it helps protect an organization's data assets from digital attacks that could damage the organization or individuals if placed in the wrong hands. Medical, government, corporate and financial records all hold personal information.

    Payment Card Fraud

    Play Episode Listen Later Feb 10, 2020 12:28


    It is a wide ranging term relating to the theft and crime committed using or involving a payment card or payment card details. The purpose may be to obtain goods or services to resell for cash or to obtain funds directly from a related bank account, usually to pay for the criminals lifestyle or to fund more serious criminal activity.

    LEXCODE INFORMATION SECURITY SPHERE

    Play Episode Listen Later Feb 8, 2020 10:47


    Lexcode Information Security Sphere SEGMENTS OF THE Lexcode Information Security Sphere 1. End-point Security 2.Network Security 3.Application Security 4.Cyber incident response 5.Regulatory compliance 6.Data protection 7.Cyber Security Training 8.Cyber Security Testing 9. Contingency Planning

    CYBER SECURITY FUNDAMENTALS

    Play Episode Listen Later Feb 7, 2020 8:48


    Cyber Security Fundamentals Cyber security is now considered as important part of individuals and families, as well as organizations, governments, educational institutions and our business. It is essential for families and parents to protect the children and family members from online fraud. In terms of financial security, it is crucial to secure our financial information that can affect our personal financial status. Internet is very important and beneficial for faculty, student, staff and educational institutions, has provided lots of learning opportunities with number of online risks . There is vital need for internet users to understand how to protect themselves from online fraud and identity theft.

    keycybr (Trailer)

    Play Episode Listen Later Feb 4, 2020 0:40


    Claim keycybr

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel