Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
Here’s how to ensure online safety of your children

Uday Mittal September 17, 2017 Leave a Comment

Here’s how to ensure online safety of your children

The BlueWhale challenge has been an eye-opener for parents across the world. It has revealed another ugly side of the internet connected world. Easy manipulation of vulnerable children and teenagers by unknown people. This has now become an additional online safety concern for parents along with online pedophiles, cyberbullying, cyberstalking and internet-trolling. Dealing with proliferation […]

Filed Under: Awareness Tagged With: blue whale challenge, bluewhale, child, children safe, Online Safety, online safety tips kids, safety tips parents

Online Safety Tips for Golden Agers

Uday Mittal September 14, 2015 Leave a Comment

Online Safety Tips for Golden Agers

Recently, I came across a question on Quora wherein a gentleman, claiming to be 80 years of age, had asked for some advice on how to learn server side languages. In fact, he aimed to beat Mark Zuckerberg and Jack Dorsy before he departs for good. Frankly, I was a bit surprised by this because I […]

Filed Under: Awareness Tagged With: Golden Agers, Older Adults, Online Safety, Online Safety Tips, Senior Citizens

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security crte crtp cyber-warfare cybersecurity Cyber Security Cybersecurity books domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mobile Security Narendra Modi NSA offensive security Online Safety opsec Password Penetration Testing pentest powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration Wifi Windows

Top Posts

  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • What is Adversary Emulation?
    What is Adversary Emulation?
  • Build Your Career in Cyber Security
    Build Your Career in Cyber Security
  • CISA: Everything You Need to Know
    CISA: Everything You Need to Know
  • Let there be no more MMS Scandals
    Let there be no more MMS Scandals
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress