Lajeen BLOG
  • Home
  • Download
  • Social
  • Features
    • Lifestyle
    • Sports Group
      • Category 1
      • Category 2
      • Category 3
      • Category 4
      • Category 5
    • Sub Menu 3
    • Sub Menu 4
  • Contact Us

 

(Author's work)






Computer Ethics is the analysis of the nature and social influence of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology (Schriffert,2018).  Furthermore, the importance of computer ethics is that it guarantees a safe and collaborative environment for users.
For example:

* Protect your personal information from manipulation, at the present we all share our personal information including 'bank details' in order to do some activities, such as online shopping. Therefore, we feel tranquillity and safe due to the protection of our personal information by the law (TECHSPIRITED,2021).

*Protect Intellectual Property from theft, it preserves your work that was created by your mind from plagiarism, what would you feel if your work attributed to someone else? (TECHSPIRITED,2021).

*Encourage Moral And Social Values in Society, it assists to reflect an individual’s personality and spirituality. Not only that but also good morals help one be able to build a good relationship in personal and professional lives as well (Rohan,2020).





There are 10 commandments of computer ethics that were created in 1992 by the computer ethics institute. In my view, I believe the 4th is the most significant and influenced commandment, which is stated that 'Thou shalt not use a computer to steal'(computer ethics institute,1992). A blatant example is hacking and phishing into a computer to loot a person's credit card number or a company's trade secrets, and that theft attempts are supposed to consider as the same as robbery(Goldsborough,2000). However, it is more dangerous than the normal robbery, because the fraudster is behind his screen and it is difficult to distinguish his identification.

Moreover, some websites or other phishing forms tend to use links that confused the victims. For instance, it could be sent an email to update your information, yet if the victim concentrates on the email address, he will recognise the similarity between the original band email and the phishing attempt

In conclusion, do not give out private information (such as your credit card details or passwords), reply to text messages, download attachments or click on any links in emails if you’re not sure they’re original(GOVUK,2020). 











References:

SCHRIFFERT, D(2018) What Is Computer Ethics?.[Online] RCVEST. Available from: What Is Computer Ethics? – The Research Center on Values in Emerging Science and Technology (southernct.edu)  [Accessed 30/04/2021].


TECHSPIRITED (2021) Importance of Computer Ethics.[Online] TECHSPIRITED. Available from: Importance of Computer Ethics - Tech Spirited  [Accessed 30/04/2021].


 ROHAN, A(2020) THE IMPORTANCE OF COMPUTER ETHICS.[Online] USUPDATES. Available from:  THE IMPORTANCE OF COMPUTER ETHICS. (usupdates.com) [Accessed 30/04/2021].


 Goldsborough, R. (2000) Computers and ethics. Medford: Information Today, Inc.


GOVUK(2020) Avoid and report internet scams and phishing.[Online] GOVUK. Available from: Avoid and report internet scams and phishing - GOV.UK (www.gov.uk)[Accessed 30/04/2021].



 In conclusion, Social media attacks usually are not discussed as original attack. Therefore, the lack of awareness will probably cause reinforcement in social media attacks. Hence, identify the motives of phishing could decrease the probability of phishing, as well as avoid the causative factors which are encouraging fraudsters concentrating on your accounts. Ideally, ‘if users were motivated to systematically process the information they receive, checking it for validity, there would presumably be less victims of phishing’ (Flowerday, V and Frauenstein, D,2016).





References:

 FRAUENSTEIN, D and FLOWERDAY, V (2016) "Social network phishing: Becoming habituated to clicks and ignorant to threats?" 2016 Information Security for South Africa (ISSA), 2016, pp. 98-105, doi: 10.1109/ISSA.2016.7802935.


   The majority of users share a massive number of personal information, thinking that it is reliable and preserves privacy. In fact, it is noticed that a significant spread of violation of privacy and theft of personal data. Additionally, phishing attacks on social media occur to certain individuals than others. Indeed, some factors make you more susceptible to phishing attacks (Parker, J and Flowerday, V,2020). Besides, online habit is considering an essential factor, energetic individuals on social media are more expected to expose to phishing attacks than those who are inactive on social media platforms (Parker, J and Flowerday, V,2020 cited in Vishwanath,2015). Demographic factors such as sexes and age group have also been found as one of affecting phishing susceptibility. Hence, the ages between 18 to 25 are more likely to be attacked (Parker, J and Flowerday, V,2020).

 

The criminals have several aims to phishing, such as stealing identities and qualifications (Deliri and Albanese, 2015). Furthermore, fraudsters probably concentrate on financial aims. For instance, they might steal the victim's bank details or they could open a bank account in your name if he has sufficient data (Wilson, 2019). Moreover, phishing in social media comes in several ways, such as fake customer service accounts, fake comments on popular posts, fake online discounts and fake trending videos. Therefore, some components could assist you to protect your accounts from any risk of your privacy. First, if you have a follow request from an anonymous, refuse it immediately (Strawbridge,2019). Second, consistently check and change your security settings to confine what individuals can and cannot see on your profile (Strawbridge,2019). Third, do not click on links that demanding your personal data. Fourth, choose a complicated and unique username and password to make it impossible to guess your details. Fifth, use an antivirus to protect your device from malware, numerous great antivirus programs caution you at whatever point you download an obscure connection or attempt to get to a dubious site.(Lockwood,2019).






References:

PARKER, J. and FLOWERDAY, V (2020 Contributing factors to increased susceptibility to social media phishing attacks. South African Journal of Information Management. [Online] 22 (1). Available from: https://search-proquest-com.proxy.library.dmu.ac.uk/docview/2414201019/fulltext/DE3FF98FC4C747A1PQ/1?accountid=10472 [Accessed 30/04/2021].


ALBANESE, M and DELIRI, S. (2015) security and privacy issues in social networks Data Management in Pervasive Systems. Springer Cham, Heidelberg, New York, pp. 195-209.


EDITOR (2016) 5 simple ways you can protect yourself from phishing attacks. [Online] WELIVESECURITY. Available from: 5 simple ways you can protect yourself from phishing attacks | WeLiveSecurity [Accessed 26/04/2021].


VINSONHALER, M(2018) Preventing Social Media Phishing. [Weblog] DLVR.IT. 14th February. Available from: Preventing Social Media Phishing [INFOGRAPHIC] - (dlvrit.com)[Accessed 26/04/2021].


STRAWBRIDGE, G (2019) How To Protect Yourself From Social Media Phishing. [Online] METACOMPLIANCE . Available from: How To Protect Yourself From Social Media Phishing | MetaCompliance [Accessed 26/04/2021].


INSPIERDELEARNING (2017) Social Media Phishing: A Primer. [Weblog] INSPIERDELEARNING. 19th October. Available from: Social Media Phishing: A Primer | Inspired eLearning Blog[Accessed 26/04/2021].


SEYMOUR, J and TULLY, P (2016). Weaponizing data science for social engineering: Automated E2E spear phishing on Twitter. [Online]. Available from: us-16-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering-Automated-E2E-Spear-Phishing-On-Twitter-wp.pdf (blackhat.com)


CASTLE, A (2018) Just Keep Swimming: How to Avoid Phishing on Social Media. [Weblog] WEBROOT. 22nd January. Available from: Avoiding Phishing on Social Media | Webroot [Accessed 26/04/2021].

      The term of phishing concept was going back as far as the early 1990s through America Online (AOL).  A group of hackers called themselves as warez community and impersonated AOL employees(Phishing,2017). The first method in which phishers carried attacks was done by using algorithms to constitute random credit card numbers to steal users’ passwords(Phishing,2017). However, it was put a stop to that types of those illegal activities by AOL in 1995 via innovative security measures in order to prevent the random illegal usage of credit card numbers( PHISHPROTECTION,2019). Nevertheless, at the present time, there is been divergences in phishing methods as the fraudulent are migrating to social media. According to Parker’s and Flowerday’s 2020 study (cited in ProofPoint,2018) demonstrates that there is a noticeable rise in phishing attempts in social media by 30% from the first quarter of 2018. The research project that I am carrying out this semester is going to determine the factors that lead to increase in the likelihood of being attacked by phishing on social media in particular, besides educating social media users about the riskiness of phishing attacks including criminals' purposes, as well as some techniques to protect users' accounts and maintain privacy. 







References:

PARKER, J. and FLOWERDAY, V (2020 Contributing factors to increased susceptibility to social media phishing attacks. South African Journal of Information Management. [Online] 22 (1). Available from: https://search-proquest-com.proxy.library.dmu.ac.uk/docview/2414201019/fulltext/DE3FF98FC4C747A1PQ/1?accountid=10472 [Accessed 30/04/2021].


 PHISHING (2017) History of Phishing. [Online] PHISHING. Available from: Phishing | History of Phishing [Accessed 30/04/2021].


 PHISHPROTECTION (2019) History of Phishing: How Phishing Attacks Evolved From Poorly Constructed Attempts To Highly Sophisticated Attacks. [Online]  PHISHPROTECTION. Available from: History of Phishing: How Phishing Attacks Evolved From Poorly Constructed Attempts To Highly Sophisticated Attacks | PhishProtection.com [Accessed 30/04/2021].


 










 

(FOLAMI,2020)


What is Malware?

The term malware defines as a ruin in devices and steals information caused by software, commonly creates by hackers who aim to steal money. However, there are several purposes to usage malware. For example, an instrument to remonstrance or a method of war between countries (avg,2019). 




What are the types of Malware?

There are several kinds of malware depending on its purposes. A simple classification of malware consists of file infectors and stand-alone malware. Another way of classifying malware is based on into their particular action: virus, worms, backdoor, trojans,. computer virus detection has evolved into malicious program detection since Cohen first formalizes the term computer virus in 1983 (Nandal,2017). However, the number of new malware specimen is significantly increasing as displayed in the below image.


(Nandal,2017)




How does it work? 

Regardless of the kind, all malware follows a similar fundamental example: The client accidentally downloads or introduces the malware, which contaminates the gadget (aavast, 2019).

Most malware diseases happen when you coincidentally play out an activity that causes the malware to be downloaded. This activity may be clicking a connection in an email or visiting a noxious site. In different cases, programmers spread malware through distributed record sharing administrations and free programming download packs. Installing a touch of malware in a well-known downpour or download is a compelling method to spread it across a wide client base. Cell phones can likewise be contaminated through instant messages (aavast, 2019).

Another method is to stack malware into the firmware of a USB stick or flash drive. Since the malware is stacked onto the device's inner hardware (instead of its record stockpiling), your device is probably not going to distinguish the malware. This is the reason you ought to never embed a new USB  into your PC (aavast, 2019).





How would I ensure the safety of my network against malware?

Regularly, organizations concentrate on protection instruments to stop breaks. By securing the border, organizations expect they are protected. Some high-level malware, be that as it may, will in the end advance into your network.   Thus, it is critical to send innovations that consistently screen and distinguish malware that has sidestepped edge protections. Adequate progressed malware insurance requires numerous layers of shields alongside significant level network perceivability and insight (CISCO, 2020).






References: 

FOLAMI, D (2020) Facing malware or virus issues on your Windows 10 PC? Here’s what to do. [Online image] Available from: Facing malware or virus issues on your Windows 10 PC? Here's what to do (jbklutse.com) [Accessed 24/04/2021].


 REGAN, J (2019) What Is Malware? How Malware Works & How to Prevent It. [Online] AVG. Available from: What is Malware? How Malware Works & How to Prevent It | AVG [Accessed 24/04/2021].


 BELCIC, I (2019) What Is Malware?. [Online] AVAST. Available from: What is Malware & What Does it Do? | Malware Definition | Avast [Accessed 24/04/2021].


 CISCO(2018) What Is Malware?. [Online] CISCO. Available from: What is Malware? - Definition and Examples - Cisco [Accessed 24/04/2021].


Nandal, P (2017) Malware Detection, Diplomica Verlag, Hamburg. [Online]  Available from: ProQuest Ebook Central - Detail page. [Accessed 24/04/2021].


 

(ANTIDEX,2018)

Phishing is a branch of cyber threats. However, what do we mean by phishing?


Phishing is known as a criminal offence in which a person pretends that he is a legitimate institution, in order to deceive the target people and steal secret information, such as personal data and banking details. Moreover, the criminal contacts the victims by email, telephone or text message (PHISHING,2019). 






What are the reasons for Phishing?


There is one obvious straightforward reason for phishing: money. Identity theft is simple and almost hazard-free. Gartner reports that just 1 of every 700 identity thieves are arraigned. Thus, phishing simplifies theft and reduces the percentage of negative consequences ( Lininger, R and Vines, R,2005).




What happens in a phishing attack?



 ( Lininger, R and Vines, R,2005).


The above picture demonstrates phishing steps minutely.







What are the used methods for a phishing attack?

Frequently, phishing is used by two approaches Malicious attachments and Access to malicious websites by links. 

1- Malicious attachments

(ITGOVERNANCE,2019)

Malicious attachments generally use attractive names like ‘INVOICE’. Subsequently, the victims install the malicious once they open it (Itgovernance,2021).



2-Access to malicious websites by links

(ITGOVERNANCE,2019)

In this method, the criminals use links that indicate a legitimate clone of websites, which download malware (Itgovernance,2021).






How to identify a phishing attack?

Here are some points assist you to recognise Phishing attack:

* If the email sent by someone you do not talk with usually, be careful!  Particularly if the email contains something irrelevant to your responsibilities (alwarebytes,2020).  

*The message attached with malware or ransomware overwhelmingly will be included as an unexpected message (alwarebytes,2020).

*Check hyperlinks because of a fake URL containing misspellings. Consequently, reveals a phishing attempt (alwarebytes,2020). 

For instance; 

(ALWAREBYTES,2019)

As it is shown, a phishing attempt asked the victim to click on 'Confirm Now'. Nevertheless, concentrating on the URL in the red rectangle, you will see the random numbers that make the message questionable. 








Reference:

ANTIBEX (2018) How Cyber-Secure Is Your Business?. [Online image] Available from: How Cyber-Secure Is Your Business? - Antibex Software[Accessed 24/04/2021].


PHISHING(2017) What Is Phishing?. [Online] PHISHING. Available from: Phishing | What Is Phishing? [Accessed 24/04/2021].


ITGOVERNANCE(2019) Phishing attacks and how to avoid them. [Online] ITGOVERNANCE. Available from: What is phishing? Everything you need to know | IT Governance UK [Accessed 24/04/2021].


ALWAREBYTES(2019) What is phishing?. [Online] ALWAREBYTES. Available from: What is phishing? How to protect from types of phishing? | Malwarebytes [Accessed 24/04/2021].


LININGER, R and VINES, R(2005) Phishing Cutting The Identity Theft Line.  [Online] Available from: ProQuest Ebook Central - Detail page[Accessed 24/04/2021].


 

(JANE, 2017)

At the present, smartphones are being a fundamental part of our lives. It is essential for daily tasks, such as shopping, online banking and social media. Therefore, it could expose personal information to risk cyber threats. Cyber threats define as ruin data or obstruct the digital prosperity and cohesion of a venture that is caused by virulent action (Roy, 2021). The perpetrators of Cyber threats have targeted many victims, which leads to negative short and long-term impacts, that include:


Short-term impacts:

1- Affecting the day-by-day activities of individuals and clients (for example influencing their capacity to receive contemporary data and doing banking operations, for example, pulling out cash from ATMs (CHOO,2011).

2- Affecting the daily activities of organizations and government. This can bring about critical monetary and different misfortunes to organizations, for example, openness to claims (for example in cases including breaks of clients' information, and expansion in operational expenses (for example financial losses because of the criminal activities and rise in security spending) (CHOO,2011).



Long-term impact:

1- Public security penetrates (for example the incident in 2010 where secret government data was spilled to Wikileaks (CHOO,2011).

2- Social discontent and turmoil (for example loss of public trust in the public authority regardless of whether the real harm brought about by the cybercriminal exercises was negligible (CHOO,2011)







  The severity of cyber threats might occur to major companies which led to a significant decrease in the company economy and notoriety (NIBUSINESS,2020). Examples of major companies that have been exposed to cyber threats:


1- NetSky and Sasser Worms:  In 2005, the computers were destroyed by a DDoS attack, around the quarter of the virus were resulting from Jaschan’s worms, the losses from that attack estimated by 20 billion dollars (TENINFO, 2020).

2- WannaCry Ransomware Attack: It is a notorious Ransomware attack, first the hackers requested an amount of $300 in Bitcoin or they will encrypt the company's data. However, after 3 days the amount doubled to  $600 due to the non-payment. The damages to decrypt cost more than $4 billion (TENINFO, 2020).

3- Sony PlayStation Network: Sony’s PlayStation Network faced a DDoS attack which disconnected the internet for around 3 weeks, the hackers exploited the defects in the system, and they succeeded in stealing from more than 77 million customers. Sony PlayStation lost more than £171 million to repay the customers for what was stolen. (TENINFO, 2020).






On the business side, how could a businessman manage the big risk of cyber threats with third parties? the risks associated with engaging third-party vendors is titled “Managing the Big Risk.” It is called the Big Risk due to that it is a massive risk, perhaps the most massive. Third parties introduce a variety of risks into virtually every environment. Small and large companies alike use multiple third-party vendors. Some companies use literally thousands of third-party vendors to assist in a wide range of operations. However, the FDIC suggests 10 essential examination contemplations (Ulsch, MacDonnell, and N MacDonnell Ulsch,2014):

1- Assess how the third party may represent a danger to your organization, not by the title or level of a position, yet rather by the level of access to data (Ulsch, MacDonnell, and N MacDonnell Ulsch,2014). 

2-  Ensure the outsider is open and receptive to addressing the individual verification measure. Trust yet confirm, as the saying goes (Ulsch, MacDonnell, and N MacDonnell Ulsch,2014). 





References:

 DEVRY, J (2017) Hunting for Needles in Haystacks. [Online image] Available from: Hunting for Needles in Haystacks - Cybersecurity Insiders (cybersecurity-insiders.com) [Accessed 23/04/2021].


 NCSC (2016) What is cyber security?. [Online]  NCSC. Available from: What is cyber security? - NCSC.GOV.UK [Accessed 23/04/2021].


 ROY, R (2021) What Is a Cyber Threat? Definition, Types, Hunting, Best Practices, and Examples. [Online]  TOOLBOX. Available from: What Is a Cyber Threat? Definition, Types, Hunting, Best Practices, and Examples | Toolbox It-security [Accessed 23/04/2021].


 NIBUSINESS (2017) Cyber security for business. [Online]  NIBUSINESS. Available from: Impact of cyber attack on your business | nibusinessinfo.co.uk [Accessed 23/04/2021].


TENINFO (2020) Top 10 of the World’s Largest Cyber Attacks. [Online] TENINFO. Available from: Top 10 of the World’s Largest Cyber Attacks - The Education Network (ten.info) [Accessed 23/04/2021].


CHOO, K (2011) The cyber threat landscape: Challenges and future research directions,Computers & Security. Australia :Mawson Lakes campus.


Ulsch, M, and Ulsch, N (2014) Cyber Threat! : How to Manage the Growing Risk of Cyber Attacks, John Wiley & Sons, Incorporated, Somerset. Available from: ProQuest Ebook Central - Detail page [Accessed 23/04/2021].


 Name: Lajeen Alsagour

Project Title:  Phishing On Social Media 



Date started

Time allowed

Task/Activity

Completed

(date)

 8-4-2021

 15 minutes

 I created a new blogger account.

 

 

 8-4-2021

8-4-2021 

 2 hours          and  30minutes

 I finished my first posts ( Welcome massage, introduction and reflection on my current software skills. 

 

 

 9-4-2021

 20-4-2021

5 hour

30 minutes 

 I worked on my project theme which is about cyber threats, so I searched its riskiness. Also, I read a book about 'The cyber threat landscape'. Moreover, I read another book titled 'How to Manage the Growing Risk of Cyber Attacks'. Therefore, with all those sources I expanded my research and I talked in different aspects, such as on the business side.

 20-4-2021

 23-4-2021

 3 hours

 I started working on my initial idea 1 on phishing, methods to use phishing, phishing steps, phishing reasons and how to recognise a phishing attack. My sources were online websites and an e-book from DMU library titled Phishing: Cutting the Identity Theft Line.

 24-4-2021

 24-4-2021

 2 hours

 I created a post that talks about my initial idea 2 on Malware, the way its works and how to protect your device from Malware. Then I read an e-book titled Malware Detection, Diplomica Verlag and I found useful information about Malware types 

 

 

 24-4-2021

 25-4-2021

 3 hours

 I started gathering information about phishing by reading an article titled 'Contributing factors to increased susceptibility to social media phishing attacks', then I read about the history of phishing to assist me to start writing the introduction.

 26-4-2021

26-4-2021

3 hour

30 minutes

 I collect some valuable information from a book under the name 'security and privacy issues in social networks'. Hence, that expanded my knowledge about phishing and I started writing my main body.

 

 

 27-4-2021

 28-4-2021

2 hours

 I search about my subject online, and I found some useful blogs that provided me with essential data

 

 

 29-4-2021

30-4-2021

 4 hours

 I read a book  online titled 'Weaponizing data science for social engineering'   that gave me significant points to my main body

 

 

 30-4-2021

30-4-2021

 

 4 hours

 

 

 I worked on my conclusion, then I adjusted my essay draft, also I ensure the validity of my references and their diversity.

 1-5-2021

30-4-2021

2 Hours

I searched about the importance of computer ethics, as well as doing further research about the chosen commandment

1-5-2021

11-5-2021

3 Hours

I started writing the initial questions for my questionnaire (project theme questions + demographic questions)

12 -5-2021

15-5-2021

1 Hour

I created my survey by using (Google Drive Forms) and I added the process of the creation on my blog

15-5-2021

15-5-2021

2 Hours

Once I completed my survey creation, I published it to my acquaintances

15-5-2021

21-5-2021

1 Hour

After receiving sufficient responses to my survey (41 responses) I started analysing demographic questions 

21—5-2021

23-5-2021

3 Hours

I analysed the questions that are related to my project theme

25-5-2021

24-5-2021

2 Hours and 30 minutes

I looked at computer methodology (Malware Analysis) and I did some research about it

25-5-2021

25-5-2021

3 Hours

I collected some information from web sources about malware spreading process, then I made a diagram from that information

25-5-2021

25-5-2021

2 Hours

I searched about DDoS attack then I made a diagram

25-5-2021

26-5-2021

3 Hours

I started gathering information from web sources to write the background of my case study-introduction (Kevin Mitnick)

27-5-2021

29-5-2021

4 Hours

I looked at the Literature Review of my case study, thus I added historical interpretation of (Kevin Mitnick), as well as his achievements and his life.

30-5-2021

31-5-2021

3 Hours

I focused on the method of my case study. Therefore, I gave the reasons of choosing (Kevin Mitnick), also I searched about his experiences and his relationships with others in ‘Hacking’

31-5-2021

2-6-2021

2 Hours

I summarised my case study and published it as the conclusion of my case study

2-6-2021

3-6-2021

5 Hours

I searched and downloaded Bricata software and discovered it in depth. Besides, I contacted with its developers to gain as much information as I can

4 – 6-2021

4-6-2021

4 Hours

I discovered Bricata platform and analysed it

4-6-2021

6-6-2021

3 Hours

I summarised the academic paper titled ‘World of Cyber Security and Cybercrime’

6-6-2021

6-6-2021

3 Hours

I collect some information about Man In The Middle attack and created a diagram

6-6-2021

6-6-2021

3 Hours and 30 minutes

I have a depth search about Worm attack, then I post it in my blog as initial idea 3

6-6-2021

8-6-2021

4 Hours

I looked at the discussion part of my case study and wrote the finding, identify my study's limitations, and suggested further research by other authors

8-6-2021

9-6-2021

3 Hours

I managed to finish the software example by providing some data about how does the software work

9-6-2021

9-6-2021

1 Hour

I made the last adjustments to my blog by checking each post

9-6-2021

9-6-2021

1 Hour

I reviewed the correctness of the references of my posts

9-6-2021


Newer Posts Older Posts Home

ABOUT ME



I could look back at my life and get a good story out of it. It's a picture of somebody trying to figure things out.

POPULAR POSTS

Contact Form

Name

Email *

Message *

Lajeen BLOG
Powered by Blogger.


CYBER SECURITY




Report Abuse

  • Home
  • Features
  • _post format
  • _error page
  • Beauty
  • Fashion
  • Lifestyle
  • Contact
  • Buy now

Search This Blog

Blog Archive

  • June 2021 (8)
  • May 2021 (10)
  • April 2021 (12)
  • Home
  • Features
  • _DropDown
  • __DropDown 1
  • __DropDown 2
  • __DropDown 3
  • _ShortCodes
  • _SiteMap
  • _Error Page
  • Learn Blogging
  • Documentation
  • Video Documentation
  • Download This Template
  • Download This Template

Footer Menu Widget

  • Home
  • About
  • Contact Us

Social Plugin

Workspace

Instagram


Contact




About Me

Lajeen saleh
View my complete profile
  • Home
  • About
  • Contact

Slider

5/random/slider

A Team Of Awesome People

We are a creative web design agency who makes beautiful websites for thousands of peoples.

Advertisement

Main Ad

Subscribe Us

Popular Posts

  • Academic Paper Summary - World of Cyber Security and Cybercrime
  • Kevin Mitnick - Method

Designed by OddThemes | Distributed By Gooyaabi Template