Saturday , February 23 2019

May, 2018

  • 25 May

    Social Networking To Gather Information?

    Social Networking To Gather Information?

    Social Networking to Gather Information: Over the last decade, some of the biggest security threats have come from the use of social networking. The rapid growth of these technologies lets millions of users each day post on Facebook, Twitter, and many other networks. What Type of Information Are They Posting? …

  • 24 May

    Cisco Half a Million Routers Have Been Hacked

    The Cisco Half of a Million Routers Have Been Hacked

    Cisco Over Half Million Routers Are Hacked: Cyber criminals have hacked and infected with virus at least 500,000 routers as well as the storage devices in what is believed to be a part of Russia attack to Ukraine. The U.S Department of Homeland Security has claimed that they are investigating …

  • 23 May

    Chinese Hackers Find Over a Dozen Vulnerabilities in BMW Cars

    Chinese Hackers Find Over a Dozen Vulnerabilities in BMW Cars

    Vulnerabilities in BMW Cars: Chinese Security Researchers have discovered dozens of vulnerabilities in the onboard computer units of BMW cars, and some of which can be used to exploit the vehicle remotely. The flaws were discovered during a year-long from security audit which is basically conducted y the researchers from …

  • 23 May

    Lawyers Exposing Client Data To Risk Of Cyber Attack

    Lawyers Exposing Client Data

    Lawyers Exposing Clients Data: A new research at Australia shows that the cyber security processes that lawyers use can put their client’s data at a huge risks. The Researchers from Edith Cowan University’s Security Research Institute performed a survey of 122 lawyers regarding the cyber security conduct. This survey has …

  • 23 May

    Social Engineering : Identity Theft

    Identity Theft

    Identity Theft: One of the most prominent and rapidly evolving threats is identity theft, which falls under the heading of social engineering. According to the Federal Trade Commission, in the United States, identity theft is one of the most rapidly growing crimes over the last few years; thus, the public …

  • 22 May

    Facebook Usage Has Increased Even After Cambridge Analytica Scandal

    Facebook Usage Has Increased Even After Cambridge Analytica Scandal

    Effect on Facebook Usage After Cambridge Analytica: Facebook has faced huge drop down in the users after the Cambridge Analytica Scandal but It has seen increased in numbers from the Goldman Sachs. The Deutsche Bank also found out the growth even after the company has removed around 583 million fake …

  • 22 May

    Mobile Device Security Models

    The Mobile Device Security Models Android & iOS

    Device Security Models: So how have designers built their systems with an eye toward addressing security problems? Several steps have been taken, but overall there has been an attempt to approach the problem of security through five key areas, each addressing a specific problem or need: Access control is used …

  • 21 May

    Goals of Mobile Security

    Goals of Mobile Security

    Mobile Security: Mobile operating system comes in four flavors: Blackberry, Windows Mobile, Google Android, and Apple iOS. Of these, the Apple iOS and Google Android operating systems are by far the ones most commonly found on modern devices. In order to simplify the examination of mobile operating system and devices …

  • 20 May

    The US Police Phone Tracking Company Hacked

    The US Police Phone Tracking Company Hacked

    US Police Phone Tracking: The Securus is a basically a phone tracking company that helps the police to track any phone which is within the U.S. Recently, The company was under a major attack when a hacker successfully hacked into the their system. According to Motherboard the hacker may have …

  • 19 May

    Security of Server Rooms and Network

    Security of Server Rooms and Network

    Server Rooms and Network: Something that also needs to be included in this discussion is protecting server room. Since these rooms contain the living, breathing heart of your network, they require increased levels of protection. This security must be robust and carefully considered because an intruder in these areas can …