Maths

BODMAS – The Order Of Mathematical Operations | Maths | Tutorial

You may come across a simple maths questions with a mixture of brackets, orders (powers), division, multiplication, addition and subtraction all at once. You may think to yourself where do I start, this is where Continue reading “BODMAS – The Order Of Mathematical Operations | Maths | Tutorial”

Technology

Phishing Attack – Facebook Post (Example) | Cyber Security | Social Engineering

With more people now using social media other than email phishing attacks through social networks such as Facebook, twitter and Instagram are now on the rise. These posts are especially difficult to judge as they may have been shared or liked many times, making it appear popular or genuine due to the popularity of the post. Continue reading “Phishing Attack – Facebook Post (Example) | Cyber Security | Social Engineering”

Technology

Phishing Attack – Text Messages (Example) | Cyber Security | Social Engineering

Text message phishing attacks have evolved over time with the advancement of security technology. OTP (One-time Password) is currently the most commonly used 2FA (Two-Factor Authentication) technique. Most banks and many retail websites now require that in addition to you logging in with a password, Continue reading “Phishing Attack – Text Messages (Example) | Cyber Security | Social Engineering”

Technology

Phishing Attack – Email (Example) | Cyber Security | Social Engineering

Phishing attacks are very common through email, it is very likely that everyone who has an email account may have come across an email trying to social engineer you for data. In this guide we will look at an example of how a phishing attack is executed through email. Continue reading “Phishing Attack – Email (Example) | Cyber Security | Social Engineering”

Technology

Phishing Attack – Phone Call (Example) | Cyber Security | Social Engineering

In this guide we will look at one example how a phishing attack can be carried out through a phone call. We will also look at what could happen to our data if the attack was successful and how we could have prevented this. More Continue reading “Phishing Attack – Phone Call (Example) | Cyber Security | Social Engineering”

Technology

How Do I Overcome Phishing Attacks? | Cyber Security | Social Engineering

What is Phishing?

Phishing is a form of cyber-attack used by criminals to social engineer your data. Their goal is to firstly make you believe the email, text or call you receive is genuine. Once this first step is successful, they will go on to manipulate you until they have all data that they require. Continue reading “How Do I Overcome Phishing Attacks? | Cyber Security | Social Engineering”

Maths

How To Use Pythagoras Theorem? | Geometry | Maths | Tutorial

This theorem proves that for a right angle triangle, the area of the square on the hypothenuse (the longest side or the side opposite the right angle) is equal to the sum of the area of the squares on the sides adjacent to the right angle.

Continue reading “How To Use Pythagoras Theorem? | Geometry | Maths | Tutorial”

Maths

What is the age of both father and son? | Algebra | Maths | Tutorial

QUESTION
The age of a father is twice the age of his son. Twenty years ago, his age was 6 times his son’s age. What is the age of both father and son? Continue reading “What is the age of both father and son? | Algebra | Maths | Tutorial”

Other

What Are The Most Popular Interview Questions? | Tutorial | Guide

Job interviews are something nearly everyone will go through once in their lives.  With most job interviews the questions are very standard and there are only so many questions that you are likely to be asked. In this guide we will look at what some of most common interview questions are and for each one a couple of bullet points to give you an idea of how to approach these questions. Continue reading “What Are The Most Popular Interview Questions? | Tutorial | Guide”