Yaksas CSC

Your Guardian in the Cyber World

  • Yaksas CSC Home
  • Home
  • About Us
    • Overview
    • Why Yakṣas?
  • Got a Question?
    • Cyber Security Basics
    • Cyber Security Education & Career
    • How to stay safe?
  • Get Invloved
    • Write for Us
    • YCSC QnA Dialogue
    • Translate Articles
  • Contact Yakṣas
  • Press Release
    • NCSAM 2015 Champion
    • STOP. THINK. CONNECT. Partner
Here’s how to ensure online safety of your children

Uday Mittal September 17, 2017 Leave a Comment

Here’s how to ensure online safety of your children

The BlueWhale challenge has been an eye-opener for parents across the world. It has revealed another ugly side of the internet connected world. Easy manipulation of vulnerable children and teenagers by unknown people. This has now become an additional online safety concern for parents along with online pedophiles, cyberbullying, cyberstalking and internet-trolling. Dealing with proliferation […]

Filed Under: Awareness Tagged With: blue whale challenge, bluewhale, child, children safe, Online Safety, online safety tips kids, safety tips parents

Games can be replayed; not life – Bury the Blue Whale

Uday Mittal August 31, 2017 Leave a Comment

Games can be replayed; not life – Bury the Blue Whale

What is this Blue Whale Game? The Blue Whale Game is an internet game. It consist of series of tasks assigned to players / participants by administrators during a 50-day period. The final challenge requires the participants to commit suicide. What is the purpose of the game? The game is claimed to be invented by […]

Filed Under: Awareness Tagged With: blue whale challenge, blue whale game

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security command and control crte crtp cyber-warfare Cyber Security Cybersecurity books Cybersecurity Cannon domain enumeration Edward Snowden forest enumeration hacker Information Security ISACA Kali Linux Mass Surveillance Mobile Security Narendra Modi NSA offensive security Online Safety Password Penetration Testing pentest poshc2 powersploit Powerview privacy red team red teaming Risk Management Social Media user enumeration Wifi

Top Posts

  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera
  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • Social-Engineer Toolkit: An Introduction
    Social-Engineer Toolkit: An Introduction
  • CISA: Everything You Need to Know
    CISA: Everything You Need to Know
  • Active Directory User Enumeration using PowerView
    Active Directory User Enumeration using PowerView
  • Red Team Operations Attack Lifecycle
    Red Team Operations Attack Lifecycle

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress