Sunday , November 18 2018

May, 2018

  • 21 May

    Goals of Mobile Security

    Goals of Mobile Security

    Mobile Security: Mobile operating system comes in four flavors: Blackberry, Windows Mobile, Google Android, and Apple iOS. Of these, the Apple iOS and Google Android operating systems are by far the ones most commonly found on modern devices. In order to simplify the examination of mobile operating system and devices …

  • 20 May

    The US Police Phone Tracking Company Hacked

    The US Police Phone Tracking Company Hacked

    US Police Phone Tracking: The Securus is a basically a phone tracking company that helps the police to track any phone which is within the U.S. Recently, The company was under a major attack when a hacker successfully hacked into the their system. According to Motherboard the hacker may have …

  • 19 May

    Security of Server Rooms and Network

    Security of Server Rooms and Network

    Server Rooms and Network: Something that also needs to be included in this discussion is protecting server room. Since these rooms contain the living, breathing heart of your network, they require increased levels of protection. This security must be robust and carefully considered because an intruder in these areas can …

  • 18 May

    Top 5 Universities of Europe (2018)

    Top 5 Universities of Europe (2018)

    Top 5 Most Best Europe Universities of 2018: Are you planning for your higher studies in Europe yet you are not sure where you would apply? Here comes a solution for you. English speaking universities are no doubt, ruling the world and are on dominating it in the long run. …

  • 18 May

    A 16 Years Old High School Student Arrested For Phishing Teachers To Change Grades

    A 16 Years Old High School Student Arrested For Phishing Teachers To Change Grades

    16 Years Kid Arrested For Phishing Teachers Change The Grades: A 16 years old high school student who was arrested on 14th May 2018 in California for conducting a phishing schema against his teachers. The efforts from the Local Law Enforcement and Contra Costa Country Task Force and the Secret …

  • 17 May

    Screensavers and Locked Screens

    Screensavers and Locked Screens

    Screensavers and Locked Screens: In the past, one of the common ways to gain access to a system to simply look around for an unattended system. In many cases, the system would be left logged in and unlocked by a user who was going to step away “for a moment” …

  • 16 May

    Emails Are No Longer Secure – Critical Flaw in PGP

    Emails Are No Longer Secure - Critical Flaw in PGP

    Email Are No Longer Secure: The Security Researchers have found a vulnerabilities in PGP or S/MIME Email Encryption methods which is known as the EFAIL which aims at exposing the encrypted emails into the simple plain text even all the messages which were transferred in past. “Now Emails is no …

  • 15 May

    Passwords and Physical Security

    Passwords and Physical Security

    Passwords and Physical Security: Passwords are perhaps one of the best primary lines of defense for an environment. Although not commonly thought of as a protective measure for physical intrusions, they do indeed fulfill this purpose. However, the downside is that unless passwords are carefully and thoughtfully implemented they tend …

  • 14 May

    Firewall Configuration in Network Security

    Firewall Configuration

    Firewall Configuration: Not all firewalls or firewall setups are created equally, so you need to be familiar with each setup and how it works. Firewalls can be set up and arranged in several ways, each offering its own advantages and disadvantages. In this section we will cover each method. Bastion …

  • 13 May

    Encryption Weaknesses

    Encryption Weaknesses

    Encryption Weaknesses: In web application, encryption plays a vital role because sensitive information is frequently exchanged between client and server in the form of logons or other types of information. When securing web applications, you must consider the safety of information at two stages: when it is stored and when …