Skip to content
Saturday, Nov 15, 2025
ICT BYTE Logo

ICT BYTE

Tech News in Nepal | #1 Tech Blog

  • HOME
  • GADGETS
    • MOBILE
    • LAPTOPS
    • SMARTWATCH
    • TABLETS
  • EVENTS
  • NEPAL
    • Banking
    • B.Sc. CSIT
    • BCA
  • MCS
    • 1st Sem
      • Managerial Communication
      • Object Oriented Programming
      • Open Source Technology
      • Design and Analysis of Algorithm
    • 2nd Sem
    • 3rd Sem
    • 4th Sem
  • Hult Prize
  • Utility Tools

Category: Cyber Security

Dr. Shaligram Parajuli elected President of CSRI Nepal. New Executive Team Set to Enhance Nepal’s Cybersecurity Framework
NEPALCyber SecurityFeatured

Dr. Shaligram Parajuli elected President of CSRI Nepal. New Executive Team Set to Enhance Nepal’s Cybersecurity Framework

The Center for Cyber Security Research and Innovation (CSRI) Nepal elected its new Executive Committee. The appointments, made through an…

byICT Byte
Boost Your Content with Stunning Visuals: Discover the Top 5 Websites for Royalty Free Images
ListCyber SecurityFeatured

Boost Your Content with Stunning Visuals: Discover the Top 5 Websites for Royalty Free Images

In today’s digital world, visual material is critical for catching attention and successfully expressing messages. Finding high-quality photos is vital…

byAkshyata Karki
Multi-stakeholder Discussion on Cyber ​​Security Policy and Process is going to happen in Nepal
EVENTSCyber Security

Multi-stakeholder Discussion on Cyber ​​Security Policy and Process is going to happen in Nepal

According to the press release released by Center for Cyber Security Research and Innovation, an event related to Cyber Security…

bySrijana Pandey
Masters of Computer ScienceCyber Security

Social Engineering Explained in Simple Way

Social engineering is the art of convincing people to reveal confidential information Common targets of social engineering include help desk…

byICT Byte
What is Sniffing?
Masters of Computer ScienceCyber Security

What is Sniffing?

Network Sniffing Sniffing is a process of monitoring and capturing all data packets passing through a given network using sniffing…

byICT Byte
Malware Threats in Cyber Security. What actually it is?
Masters of Computer ScienceCyber Security

Malware Threats in Cyber Security. What actually it is?

Malware Overview Malware is a malicious software that damages or disables computer systems and gives limited or full control of…

byICT Byte
System Hacking. Here is how your system can be hacked
Masters of Computer ScienceCyber Security

System Hacking. Here is how your system can be hacked

What is system hacking? System hacking is defined as the compromise of computer systems and software to access the target…

byICT Byte
Cyber Security Vulnerability Assessment
Cyber SecurityMasters of Computer Science

Cyber Security Vulnerability Assessment

Vulnerability analysis is the next phase of Ethical hacking to identify the security holes or vulnerabilities in your system or…

byICT Byte
Enumeration in Cyber Security! Everything that you need to understand.
Masters of Computer ScienceCyber Security

Enumeration in Cyber Security! Everything that you need to understand.

What is Enumeration? In the enumeration phase, attacker creates active connections to system and performs directed queries to gain more…

byICT Byte
Scanning Networks in Cyber Security
Cyber SecurityMasters of Computer Science

Scanning Networks in Cyber Security

Network Scanning Concepts Network scanning refers to a set of procedures for identifying hosts, ports, and services in a network.…

byICT Byte

Posts navigation

Older posts

Copyright © 2025 ICT BYTE | Expose News by Ascendoor | Powered by WordPress.