Wednesday , January 23 2019
Home / Mirza Ghalib (page 30)

Mirza Ghalib

A Passionate Bloggers from Pakistan, Who Loves to Put Content That Talks About The Reality of Current Situations.

Social Networking To Gather Information?

Social Networking To Gather Information?

Social Networking to Gather Information: Over the last decade, some of the biggest security threats have come from the use of social networking. The rapid growth of these technologies lets millions of users each day post on Facebook, Twitter, and many other networks. What Type of Information Are They Posting? …

Read More »

Cisco Half a Million Routers Have Been Hacked

The Cisco Half of a Million Routers Have Been Hacked

Cisco Over Half Million Routers Are Hacked: Cyber criminals have hacked and infected with virus at least 500,000 routers as well as the storage devices in what is believed to be a part of Russia attack to Ukraine. The U.S Department of Homeland Security has claimed that they are investigating …

Read More »

Lawyers Exposing Client Data To Risk Of Cyber Attack

Lawyers Exposing Client Data

Lawyers Exposing Clients Data: A new research at Australia shows that the cyber security processes that lawyers use can put their client’s data at a huge risks. The Researchers from Edith Cowan University’s Security Research Institute performed a survey of 122 lawyers regarding the cyber security conduct. This survey has …

Read More »

Social Engineering : Identity Theft

Identity Theft

Identity Theft: One of the most prominent and rapidly evolving threats is identity theft, which falls under the heading of social engineering. According to the Federal Trade Commission, in the United States, identity theft is one of the most rapidly growing crimes over the last few years; thus, the public …

Read More »

Mobile Device Security Models

The Mobile Device Security Models Android & iOS

Device Security Models: So how have designers built their systems with an eye toward addressing security problems? Several steps have been taken, but overall there has been an attempt to approach the problem of security through five key areas, each addressing a specific problem or need: Access control is used …

Read More »

Goals of Mobile Security

Goals of Mobile Security

Mobile Security: Mobile operating system comes in four flavors: Blackberry, Windows Mobile, Google Android, and Apple iOS. Of these, the Apple iOS and Google Android operating systems are by far the ones most commonly found on modern devices. In order to simplify the examination of mobile operating system and devices …

Read More »