A computer exploit usually refers to vulnerability on software through which hackers can gain access to data. Usually, users are not even aware that such vulnerabilities exist and this puts them in a very precarious position. The problem is generally fixed by the developers, and they avail the safer software through updates. It is therefore incumbent upon the user to …
What is Identity Theft? How to Protect Yourself in 2019
Identity theft is one of the most downplayed yet incredibly risky threats to your data security. As can be inferred from the name, it involves impersonation. Usually the hacker or criminal will gain your personal data and use it for their own financial gain. They can use your passwords to gain access to your accounts, and then proceed to make …
What is Spoofing? How to Mitigate Under the Radar Threats
Spoofing refers to impersonation by a hacker of another website or device on a network. They will often pick a device or website that you trust, which means that you are more likely to divulge sensitive information without raising an eyebrow. Usually, spoofing involves emails, IPs and DNS.
The only way to spot spoofing is by being very keen. If …
How to Remove Mobile Malware and Keep Your Device Protected in 2019
Mobile malware can be frustrating to say the least. The virus can be in a file or you might have a whole app corrupted. The tell-tale signs of mobile malware include slow performance and a fast- draining battery. They both occur due to the programs working in the background thus consuming a lot of charge and tying up other processes. …
Stress and Burnout Takes its Toll on the Security Industry
At the moment it is possible to get employees who are suffering from daily stress in the sector where burnout is overlooked, common and unluckily receives a reward.
If you are the person working on the security of the computer and think over the hurdles put by attackers, then you truly comprehend what you are facing. Although you work to …
Several Cryptojacking Apps Found on Microsoft Store
Among the latest discoveries of the Symantec are the eight apps on the Microsoft that have been really found to have the capacity to mine the Monero even without the user’s authority or knowledge! The potentially unwanted applications commonly known as the PUAS was discovered on the 17th date of January. These potentially unwanted applications are actually contained in the …
Build a Blockchain PoC Application using Hyperledger Fabric
This piece of experience written by Don li in creating a blockchain PoC application for land and title recording on blockchain leveraging Hyperledger Fabric (HF) blockchain platform. It may benefit those who just got started on HF or intend to learn it and for those who are already experienced in HF it may offer another equally viable option.
See what …
How to get HTTPS working on your local development environment in less then 10 minutes
This information shared by Daksh on Medium about the https installation on local development environment.
See what he is saying:
[“ Almost any website you visit today is protected by HTTPS. If yours isn’t yet, it should be. Securing your server with HTTPS also means that you can’t send requests to this server from one that isn’t protected by …
Security: Your Phone Is Listening To Your Conversations
This Conversation of a boy with her ex girlfriend posted on medium.
Please read and analyse what we are facing nowadays:
“
“I haven’t spoken to her in years,” he said. “Have no contact with her — no clue if she’s even alive.”
“You’ve never Googled her or looked her up on Facebook?” I asked.
“Nah, never,” he said. “I …
S3 Security and Privacy; What is Old Is New Again
There had been a lot of untrue facts about the insecurity of the S3 system in the recent past with a claim of a massive data breach! Is it really true that there are insecurity issues with the S3 bucket? Is it really not possible for Amazon to fix this? The truth is, everything is really fine with S3 security. …