Monday , September 24 2018
Home / IT Security

IT Security

EU Set to Legislate on Terror Content

EU Set to Legislate on Terror Content

The European Commission to force social networks to take down the terror content within an hour, in light of the apparent failure of self-regulation. Security commissioner, Julian King, told the FT on Sunday that he had “not seen enough progress” from the likes of Facebook, Google and Twitter on that …

Read More »

Pakistan Citizens Data is No More Secured

Pakistani Citizens Data is No More Secured

Pakistani Citizens Data is No More Secured: Well, it is true from 2016 till Yet 2018 the Pakistanis Data is no more secured at all, Government fails to protect the nations private information such as Mobile Phone Number Details, NAADRA Details, PTCL Details, Calling From Someone else Phone Number To …

Read More »

Historically High Q2 for Mobile Banking Trojan

The Historically High Q2 for Mobile Banking Trojan

Historically High Q2 for Mobile Banking Trojan: Mobile banking Trojan is ranked as the top security problem in the second quarter of 2018, which do includes the threats from a new cyber-espionage group, “Operation Parliament,” which is specially targeting the high profile companies of Middle East and North Africa, especially …

Read More »

Dixons Carphone: Breach Hit 10 Million Personal Records

Dixons Carphone: Breach Hit 10 Million Personal Records

Dixons Carphone has revealed its estimation of how much the customer data was stolen in the recent disclosed breach by almost nine million records. The UK retailer has revealed in June that the attackers had accessed almost 1.2 million personal data of Currys PC World and Dixons Travel Store customers. …

Read More »

VIRTUALIZATION AND DISTRIBUTED COMPUTING

VIRTUALIZATION AND DISTRIBUTED COMPUTING

Virtualization and distributed computing have revolutionized the computing world, bringing the wholesale changes to the applications, services, system data, and the data centers. VIRTUALIZATION Virtualization adds software between an operating system and the underlying computer hardware. This allows multiple “guest” operating systems to run simultaneously on one physical “host” computer. …

Read More »

Types of Biometric Controls

Types of Biometric Controls

There are a number of biometric controls that are used today; below we have the major implementations and their specific pros and cons with regards to access control security.   Fingerprints Fingerprints are the most widely used biometric control available today. Smartcards can carry fingerprint information. Many U.S government office …

Read More »

PERSONNEL SECURITY

PERSONNEL SECURITY

Users can pose the biggest security risk to an organization. Background checks should be performed, contractors who needs to be securely managed, and the users ought to be properly trained and made aware of the security risks, as we will discuss next. Security Awareness and Training Security awareness and training …

Read More »