Skip to main content

Why I Chose Blogger for My Cybersecurity Task


 

When I started working on my cybersecurity project, I needed a platform where I could easily share my posts, explain technical concepts, and present everything in a clean, simple way. After looking at different options, I chose Blogger, and here’s why it turned out to be the best fit for my task.

1. Very Easy to Use

Blogger is one of the simplest platforms for writing and publishing content. I didn’t need to install anything or learn complicated tools. I could just log in, create a post, and publish it immediately. This saved me a lot of time and helped me focus more on the actual cybersecurity content instead of managing a website.

2. Perfect for Beginners

Since this project is part of my studies, I needed something that wasn’t too advanced. Blogger’s editor is straightforward and works like a normal text editor. Even adding images, headings, or formatting is very simple. I didn’t have to worry about coding or design.

3. Free and Reliable Platform

Blogger is completely free to use, which is ideal for students. It also runs on Google’s servers, so the site loads fast and doesn’t need any maintenance. I didn’t have to think about hosting fees, storage, or website security.

4. Clean and Customizable Themes

For a cybersecurity topic, I wanted the blog to look neat and professional. Blogger offers simple themes that are easy to customize, and I could adjust the layout to match my posts. Even without design skills, I managed to make the blog look organized and readable.

5. Easy to Organize Cybersecurity Posts

Blogger lets me use labels, sections, and pages, which helped me organize the different posts—like explanations, examples, case studies, and images. Anyone visiting the blog can easily navigate through the content.

6. Good for Sharing Educational Content

My main goal was to create a blog that explains cybersecurity topics in an easy way for students or beginners. Blogger is perfect for educational content because it’s simple, distraction-free, and focused on writing.

Conclusion

Overall, I chose Blogger because it is beginner-friendly, free, reliable, and perfect for creating and organizing multiple posts. It allowed me to focus on what really matters—explaining cybersecurity concepts clearly and sharing the information in a simple and accessible way.

Comments

Popular posts from this blog

How to Protect Yourself and Your Website from Clickjacking

 The good news is that clickjacking can be prevented — both by users and website owners. Here’s what you can do. If You’re a Website Owner 1. Add X-Frame-Options This tells browsers whether your site is allowed to be loaded inside an iframe. Using: DENY → no site can embed yours. SAMEORIGIN → only your own domain can embed your pages. 2. Use a Stronger CSP Rule Content Security Policy lets you decide who can load your site in a frame: Content -Security-Policy: frame-ancestors 'self' ; 3. Avoid Putting Sensitive Actions in Frames If a button performs an important function (payment, settings, etc.), keep it outside iframes. If You’re a Regular User Don’t trust shady download/play buttons. Keep your browser updated. Use an ad-blocker or iframe-blocking extension. Don’t click random links from unknown sites. Final Thoughts Clickjacking works because it targets people , not systems. The best defense is awareness — knowing how the trick works mak...

Welcome to My Blog

 Hi! Thanks for stopping by. This blog is all about clickjacking —a sneaky type of attack that most people don’t even know is happening while they browse the internet. I created this space because I wanted to explain this topic in a simple and easy way, without using heavy technical words or confusing explanations. Here, I’ll be sharing what clickjacking is, how it actually works, real examples you might have seen online, and how you can protect yourself from it. Everything is written from a normal person’s point of view, so you can understand it even if you’re completely new to cybersecurity. Feel free to explore the posts, learn at your own pace, and hopefully become a bit more aware of what’s going on behind the clicks you make every day.

Hidden Clicks, Real Damage: Clickjacking Case Studies

  Case Study 1: Social Media LikeJacking Scam Background A popular social media platform saw a sudden increase in suspicious “Likes” on random pages. Users complained that they never clicked “Like,” yet their profile was promoting unknown pages. What Happened Attackers created a website offering “Watch Free Movies.” A big orange Play button appeared on the page. But behind that button, a hidden Facebook Like button was placed using a transparent iframe. When users clicked Play → they unknowingly liked a spam page. Impact Thousands of users unknowingly boosted fake pages The spam pages gained followers quickly Those pages later spread phishing and scam links Lesson Simple UI manipulation can trick even experienced users. Social media platforms must ensure critical actions (like, share, follow) cannot be executed inside frames. Case Study 2: Online Banking Clickjacking Fraud Background A regional bank noticed several customers reporting unauthorized fund tra...