Articles By This Author


Darker Side of Malicious Bots-What kind of damage can malicious bots cause?

Recently a report published by Radware reveals that nearly 58% of the malicious bots traced in February 2020 by various IT security platforms mimic human


Install Roundcube Webmail with Apache / Nginx on Ubuntu 20.04.

Roundcube is a free and open source webmail client written in PHP. A webmail is a mail client in your browser, which means instead of


How to Build Spam-Free WordPress Contact Forms (Ultimate Guide)

How do you stop spam hitting your blog? Do you know a lot of spam submissions are automatic using bots? However, there are ways you


Zero Trust, SASE – Digital Enablers or Adding Complexity to Cyber Ecosystems

Given the title of this article I suspect you are reading this because you have been in a recent situation where you have been asked


How Scammers Impersonate Your Carrier in Texts

Back when digital scams were new, they used to impersonate the position of someone in power. Whether it was a wealthy prince from another country


What to do when you receive an extortion email from Malwarebytes Labs

Extortion emails are nothing new, but with the recent increase in frequency, many people are looking for guidance. If you have received such a message


How to Remove Your Facebook Account

Facebook is the most popular social media platform in the world and is used for all kinds of things, such as sharing international news, communication


How to upgrade Ubuntu LTS 18.04 to Ubuntu LTS 20.04.

Good news for Ubuntu users: Canonical’s on 23. April 2020 Ubuntu 20.04 LTS published. As this is an LTS (Long Term Support) version, ubuntu users


How to reboot KDE Plasma without rebooting

KDE plasma is one of the best desktop environments out there. It’s the most customizable desktop environment I’ve ever used, and perhaps the most customizable.

Hosting Server

Throwing the Insider Threat with Network Traffic Analysis

This article is written by Matt Alderman, CEO of Security Weekly. For decades, anyone analysing network traffic has been focusing on the external network traffic,