BLESSING IFEOLUWA OMOGBEHINImage-Based Phising: Recognizing and Avoiding Hidden Cyber ThreatsSteganography is an ancient technique for hiding messages or information within non-secret text or data. it hides the existence of the…13h ago13h ago
BLESSING IFEOLUWA OMOGBEHINDIGITAL DEVIL’S AGENDA: AN EFFORT TO JEOPARDIZE THE CIA TRIADIn the highly technical world of cybersecurity understanding the strategies employed by malicious actors is pivotal for fortifying…Aug 13Aug 13
BLESSING IFEOLUWA OMOGBEHINHOW TO USE WIRESHARK TO CAPTURE LOGS, TRYING TO GAIN ACCESS TO A WEBSITEWHAT IS WIRESHARK?Aug 8Aug 8
BLESSING IFEOLUWA OMOGBEHINMastering URL Analysis: A Defense Against Phishing AttacksCountless numbers of organizations has lost critical infrastructures, finances and their reputation as a result of phishing URLs. The…Aug 8Aug 8