July, 2018

  • 16 July

    PERSONNEL SECURITY

    PERSONNEL SECURITY

    Users can pose the biggest security risk to an organization. Background checks should be performed, contractors who needs to be securely managed, and the users ought to be properly trained and made aware of the security risks, as we will discuss next. Security Awareness and Training Security awareness and training …

  • 16 July

    Misconceptions About Incognito Mode

    Study Shows Misconceptions Regarding Incognito & Private Mode

    Study Shows Misconceptions Regarding Incognito & Private Mode: The researchers from the University of Chicago have found out that there is a lot of misconception regarding incognito mode among the users. Many of which the users thing that their employers or the ISPs would not be able to check out …

  • 14 July

    Facebook Reportedly Hires AI Chip Head From Google

    Facebook Reportedly Hires AI Chip Head From Google

    Facebook is for sure continuing to more resources on to the development of AI-focused chips, which is why they are bringing the senior director of engineering from Google who worked on chips for Google’s products to lead its efforts, Bloomberg reports. We have reached out to the Google and Facebook …

  • 12 July

    YouTube Launches New Tool For Finding and Removing Unauthorized Re-Uploads

    YouTube Launches New Tool For Finding and Removing Unauthorized Re-Uploads

    Re-uploading videos on YouTube is a favorite scammy channel that gets profit from other people’s hard work. The Copyright owners have already many ways to protect their content, but Today, they are introducing a new tool that automatically scans every single new videos that are uploaded to check whether the …

  • 12 July

    YouTube TV Goes Down During World Cup

    YouTube TV Goes Down During World Cup

    The Croatia scored and the score is 1-1 against the England. If you are a YouTube TV subscriber, you might not know about the YouTube TV was down for almost 40 minutes. Update: it’s back just in a time for extra time. People who have paid $40 a month to …

  • 11 July

    THE OSI MODEL

    THE OSI MODEL

    The OSI (Open System Interconnection) reference model is a layered network model. The model is of course abstract; we do not directly run the OSI model in our systems (most now use the TCP/IP model). Rather, it is used as a reference point, so “Layer 1” (physical) is universally understood, …

  • 10 July

    Apple Releases New iPad, FaceID Ads

    Apple Releases New iPad, FaceID Ads

    Apple has successfully releases their handful of new ads which is promoting the iPad’s portability and convenience over both laptops and the traditional paper solutions. The 15 second ads which focus on how the iPad can make even the most tedious things travel, notes, paperwork, and makes things bit easier. …

  • 9 July

    MOBILE DEVICE ATTACKS

    MOBILE DEVICE ATTACKS

    A recent information security challenges is the number of mobile devices ranging from USB flash drives to laptops that are infected with malware outside of a security perimeter, and then carried into an organization. Traditional network based protection, such as the firewalls and intrusion detection systems, are powerless to prevent …

  • 9 July

    DATABASE SECURITY

    DATABASE SECURITY

    Database present unique security challenges. The sheer amount of data that may be housed in a database which requires the special security consideration. As we will see shortly in the “Inference and aggregation” section, the logical connections database users may lead to inference and aggregation attacks, requiring database security precautions …

  • 8 July

    SYSTEM VULNERABILITIES, THREATS, AND COUNTERMEASURES

    SYSTEM VULNERABILITIES, THREATS, AND COUNTERMEASURES

    System threats, vulnerabilities, and countermeasures describe security architecture and design vulnerabilities, as well as the corresponding exploits that may compromise system security. We will discuss countermeasures, or the mitigating actions of that to reduce the associated risk. COVERT CHANNELS A covert channel is any communication that violates security policy. The …