Wife’s Encrypted Message
He better decrypts the message and follows the action to avoid the catastrophe.
Cybersecurity | Filmmaking | Perspective
He better decrypts the message and follows the action to avoid the catastrophe.
Are teens the mastermind of cybercriminal group “Lapsus$”. Too early, but here are some interesting findings so far. Click on the sketch to read the story.
Cyber gang Lapsus$ breached 190 GB of Samsung Galaxy source code and leaked via Torrent. Is it just the beginning of a new data extortion crime? Click on the sketch to read the story.
Part 3 on how to prevent SQL Injection attacks using input validation technique. Click on the sketch to read the story.
Imagine you say to your kid “EAT ICE-CREAM” all the time instead of saying “NOT EVERYDAY”. Click on the sketch to read the story to learn examples of how SQL injection works in reality. Click on the sketch to read the story.
Part 1 or 3 – What is SQL Injection? Click on the sketch to read the story.
Batman likes tea. The Joker loves coffee. Let’s make them friends using public-key cryptography.
Learn data classification with famous Netflix Korean show SQUID GAME.