Tuesday , 16 April 2024
Home 4 Security (page 2)

Security

Hackers probe PC security

Cyber criminals are carrying out reconnaissance mission on PCs, so they can tailor their attacks, according to Security Company, when hackers find a computer that is vulnerable to attack, they infect it with a small piece of malicious software called a downloader this will initially “sniff” around the victim’s PC, looking for other vulnerabilities, it …

Read More »

Protect your photo privacy when uploading to Internet

Your digital photo hold all sort of information, you no doubt know what that you can find the date and time taken, date modified and exposure information in your photo’s metadata, you might also know that your photo can tell what make and model of camera you used and even the lens and flash, but you might also be storing your name, your home address and other private or potentially embarrassing information in those files as well all of which other people can see if you post the photos online. Photo Metadata Quite a lot of information is lurking around inside your photos more than you might know, you can uncover all that metadata either in windows itself or through a photo organizer, if you use Windows Vista, for example right click a photo and choose properties, then click the details tab, and you should see much of the metadata …

Read More »

Protect Your Network with OpenDNS

The security benefits are well worth the times investment, OpenDNS can protect your small business network, is take a few minutes to set it up and is free and has contributed significantly to combat against the conficker worm, and it will protect your network from any number of future attacks, as a bonus, it may help your network users experience better browsing performance. Before i describe how to do this, let’s review what the domain name system is, much as a phone book lets you look up people’s phone number by looking up their names, the DNS provide a unique address registry for computer, type in “google.com”, and DNS translates that name into a sequence of four numbers called an IP Address (for google.com, it’s 209.85.171.100). In the overall internet infrastructure, various public, semi-public and private providers maintain a series of master phone books, or DNS root servers at strategic …

Read More »

Facebook, is your identity at risk

The total number of users on the social networking site Facebook has now soared above the 200 million mark. Just to put that into perspective: if Facebook were a country, it would be the fifth largest on Earth, after China, India, the U.S. and Indonesia. According to a recent report by ComScore, European users of social network Facebook have grown by 314% over the past year to nearly 100 million users. Many of the aspects that make Facebook and other social networking sites so popular also make them a prime hunting ground for identity thieves, online scam artists and criminals. However, there are a few measures you can and should take to protect yourself. Beware of divulging personal information on your user profile Many users don’t think twice about entering a wealth of personal information into their user profiles, everything from their address to their date of birth and home …

Read More »

Get paid to be a hacker

Talking about ethical hacking, which is the need of the hour, to protect all online transactions from the wrath of viruses, An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacking is also known as penetration testing, intrusion testing, and red teaming. Ethical Hacking is a scientific approach of understanding the tools, techniques and methodologies used by malicious hackers, thereby evaluating and mitigating the enormous threat posed by them. In other words, it is studying the vulnerability of a computer system and designing a security system, which is non-hack able. The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a …

Read More »

Staying safe on Facebook

Recent news stories have reported a litany of facebook horror stories from geriatrics, people over age 30 who dented their dignities, if not their careers, through careless social networking, some people think that the post-collegiate crowd is simply too fuddy-duddy for facebook. Others insist that the site is now as essential as email and phone service, if not air and water, and nobody of any age should be discouraged from squandering time on facebook, even Bill Gates is reported to have a half-hour a day facebook habit, a typical facebook humiliation scenario involves having someone post something questionable to your wall, the public facebook page and then having that item inadvertently and automatically blasted to everyone you know via facebook. That group often includes business associates and other people with whom you’ve cultivated an illusion of respectability, because of the internet offers so many paths to public humiliation, it’s not …

Read More »

Risk overstated for kid surfers

Children surfing the web are at no greater risk than when they are offline, according to US report, it says internet related sexual exploitation of young people remains a concern, but research showed it usually involves adolescents well aware that they are engaging with an adult with a view to sexual activity. The biggest problem for young people, online or off is bullying and harassment by their own age group, submissions from social report from a technical advisory group, most of the research pre-dates the rise of social network and area that needs further investigation, the research shows that the risk minors face online are complex and multifaceted and are in most case not significantly more than those they face offline and that as they get older minors themselves contribute to some of the problems. Unwanted exposure to pornography does occur online but those most likely to be exposed are …

Read More »

You have power to defeat security threats

Security is a top concern for businesses of all sizes, everywhere. Your valuable business data is the lifeblood of your organisation, and protecting it is vital. There may be a host of conflicting messages out there about how to best protect your data. Is not designed to help you resolve every single security problem on a technical level, but rather to help you better understand which are the true threats to your business systems and data. Establishing a security policy Examine the rationale for the immediate and prioritised implementation of solid security mechanisms. You’ll learn how to work with a trusted security business partner to craft your security policies. Identifying and mitigating reconnaissance and access attacks Learn about the unauthorised discovery and mapping of your corporate computer systems, services and components, and how to be constantly aware of the potential for information gathering, which is often the precursor to a …

Read More »

Safeguard Your Data

A discreetly tucked away folder that contains your resume, your tax returns and another important file may be convenient for you, but it’s also a gold mine for online crooks that steal and sell digital data on a thriving black market, even though encrypting data unquestionably helps protect it from thieves, many users in the past believed that using encryption tools wasn’t worth the trouble. In the 2007, thefts laptops, hard drives and computer gear accounted for 57 percent of sensitive data losses report by companies, luckily as data theft has become more common, encryption has gotten easier to use, an array of option to day, both free and paid can keep your information save even if someone walks off with your laptop or break into your PC. Encrypting everything Full disk encryption protects everything on a hard drive even if the drive departs in someone else’s pocket, BitLocker a …

Read More »