VNorm

Follow Us

Cyber Security

Cyber security can be described as the collective methods, technologies, and processes to help protect the confidentiality

Default cover image
Fake BTS Network and How to protect

A fake BTS network (whose full name is Base Transceiver Station), illegal base station, or directly attack user by cellular tower set up with malicious intent to intercept mobile communication to spy on their victims, steal sensitive information, or even launch subsequent attacks. Some of the major vulnerabilities associated are listed below: Using a 2G […]

Top 11 Testing methodologies for web application security
Top 11 Testing methodologies for web application security

Web app security testing methodologies make sure that apps are strong against prospective weaknesses and threats. Here are some of the most popular and useful methodologies:  

Beware of new scams by remote control (Wireless paring)-Social engineering
Beware of new scams by remote control (Wireless paring)-Social engineering

Considerable online activity surge necessitates awareness of lurking scams, phishing schemes, and other cyber threats that exploit electronic devices. Fraudsters and cybercrooks often get hold of your address, phone number, and other sensitive information through illicit means somehow. Hackers might infiltrate your network via unsecured public WiFi and pilfer sensitive info. Posing as a supplier […]

Tips: How to make sure your phone is secure
Tips: How to make sure your phone is secure

For many of us, a smartphone is the technological item we use most frequently in our daily lives. These days, mobile phones serve as portable computers with a wide range of programs for everything from social networking to online banking. Gone are the days when the primary use of mobile phones were to make calls […]

Default cover image
WordPress Version 6.5.5 Releases Security updates

On June 24, 2024, WordPress 6.5.5 was released to the public. This release features three security fixes. Because this is a security release, it is recommended that you update your sites immediately. This minor release also includes 3 bug fixes in Core. The security team would like to thank the following people for responsibly reporting vulnerabilities and allowing them to be […]

Default cover image
Tips to protect passwords

Follow tips below: 1. Use a Strong Password 2. Enable Two-Factor Authentication 3. Avoid Using Personal Information 4. Use a Password Manager 5. Update Passwords Regularly 6. Use Different Passwords for Different Accounts 7. Be Wary of Phishing Attempts 8. Never Share Passwords with Others 9. Use passwords for Added Security 10. Use a Mix […]

Default cover image
Issues with names that don’t adhere to Facebook’s name policy

What is not permitted? use Symbols ៚! @ # $ ~ use mixed multiple languages title of role (professional, religious,position) Words or phrases in sentences with inappropriate swear words or terms that are provocative in any way. Here are some important points to remember. Your profile should display the name that you are commonly known by […]

How to Add HTTP Security Headers in WordPress
How to Add HTTP Security Headers in WordPress

What Are HTTP Security Headers? With the use of HTTP security headers, your website’s server can thwart typical security risks before they have a chance to compromise your website. Your web server replies to the user’s browser with an HTTP header when they visit your WordPress website. Browsers can learn about error codes, cache control, […]

How to use Public WiFi safely
How to use Public WiFi safely

Be careful to include sensitive information such as: personal information, usernames, and passwords on the website. They should be avoided if not necessary or not important Do not create a new online service account, as this may allow hackers to access your account. Avoid re-verifying your identity in any service that may be fraudulent and […]

How to Protect your Facebook account from Hacker
How to Protect your Facebook account from Hacker

Nowadays, there are a lot of people who lost their Facebook accounts and do this to avoid other risks to their lost Facebook accounts. You must follow this step: Protect your password Don’t use your Facebook password anywhere else online, and never share it with other people. Your password should be hard to guess, so […]

Updating policies and Deleting inactive google account
Updating policies and Deleting inactive google account

  On May 16, 2023,Google announced! Google are going to roll this out slowly and carefully, with plenty of notice: While the policy takes effect today, it will not immediately impact users with an inactive account — the earliest we will begin deleting accounts is December 2023. We will take a phased approach, starting with accounts […]

The Dangers of Phishing: What You Need to Know
The Dangers of Phishing: What You Need to Know

Phishing is a cybercrime in which  targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing: sensitive data such as personally identifiable information, banking and credit card details and passwords. Objective History of Phishing Phishing techniques were described as far back in 1987, but the […]

How To Remove Server Name From Apache Response Header
How To Remove Server Name From Apache Response Header

the HTTP headers sent by the remote web server disclose information that can aid an attacker, such as the server version and languages used by the web server. ServerSignature Off: This directive hides the server version and OS details on server-generated pages like error messages. ServerTokens Prod: Limits the information returned in the Server HTTP header to […]

Introduction to crypto primitives and protocols
Introduction to crypto primitives and protocols

primary network security Vulnerabilities of Computing Systems Main security attacks Malware Ransomware Denial of service Phishing and spear-phishing email campaigns Advanced persistent threats Social engineering Malware Malware is malicious software such as spyware, ransomware, viruses and worms. Malware is activated when a user clicks on a malicious link or attachment, which leads to installing dangerous […]