Kinza Yasar
93 articles published since January 25, 2021
Page 4
About Kinza Yasar
Kinza is a technology journalist with a degree in Computer Networking and numerous IT certifications under her belt. She worked in the Telecommunications industry before venturing into technical writing. With a niche in cyber-security and cloud-based topics, she enjoys helping people understand and appreciate technology.
What Is the Google Chrome Privacy Sandbox?
Google's Chrome Privacy Sandbox was recently launched to re-shape online ad tracking. Here's what that means for you.
Are Browser Extensions Really Safe?
While they provide a customized functionality to our browsing experience, are browser extensions safe to use?
What Are Wi-Fi Frag Attacks and How Can You Protect Against Them?
Short for "fragmentation" and "aggregation", Frag attacks allow hackers to bypass firewalls to inject code into Wi-Fi traffic.
What Are Keyloggers? Five Easy Ways to Protect Against Them
A grave threat to your sensitive information, keyloggers can record every keystroke on a device.
Is It Possible to Hack the Blockchain?
A ledger of digital transactions, the blockchain makes it difficult to alter digital assets. But can it be hacked?
What Is Whitelisting and How Do You Use It?
Sick of spam and unwanted contact? You need to start whitelisting.
Quitting Yahoo? Here's How to Delete a Yahoo Email Account
Planning to bid farewell to Yahoo and transition to another email? Here's a step-by-step on how to delete your Yahoo.
What Is an Evil Maid Attack and How Can You Prevent Falling Victim?
Going on vacation or regularly leave your device unattended? Here's why you need to be cautious about hardware security.
How to Join and Hold Zoom Calls on Chromebook
Zoom is one of the most popular video conferencing apps available on the internet. Here's how to use it on a Chromebook.
What Is Packet Sniffing and How Can You Stop Sniffing Attacks?
A way to monitor data packets through a network, packet sniffing can be used by IT professionals and threat actors alike.
What Is a Worm and How Does It Get on Your Computer?
Peskier than a computer virus, a worm can self-replicate and cause serious damage to a vulnerable machine.
Does HTTPS Protect Data in Transit?
What makes HTTPS, the secure version of the internet protocol, so safe? Does it really look after your personal info?
How to Send and Open a Confidential Email in Gmail
Want to keep your email transactions private? Gmail's "confidential" mode is intended to keep your messages secure.
What Is Private Browsing and How It Can Help You Browse Securely?
Private browsing allows you to create an isolated browsing environment, preventing you from getting tracked.
What Is Sandboxing and How Does It Protect You Online?
An isolated test environment where new code and potentially malicious websites can be run securely to test out their behavior patterns.
Has Your Phone Number Been Leaked Through Facebook?
Are you worried that your personal details have been divulged during the recent Facebook data breach?
What Is Adaptive Security and How Does It Help With Threat Prevention?
A real-time security monitoring model, adaptive security utilizes modern tactics to mitigate ever-evolving cyber threats.
What Is Fileless Malware and How Can You Protect Yourself?
Fileless attacks are evasive and do not require malware or the installation of new software to infect a device.
What Does Indicators of Compromise Mean? The Best Tools to Help Monitor Them
Indicators of Compromise provide clues and evidence regarding data breaches. Learn the importance of monitoring them and four tools that can help.
What Is Purple Fox Malware and How Can It Spread To Windows?
Learn everything about the re-purposed Purple Fox malware and how to protect yourself from this growing threat.