Home / IT Security

IT Security

Goals of Mobile Security

Goals of Mobile Security

Mobile Security: Mobile operating system comes in four flavors: Blackberry, Windows Mobile, Google Android, and Apple iOS. Of these, the Apple iOS and Google Android operating systems are by far the ones most commonly found on modern devices. In order to simplify the examination of mobile operating system and devices …

Read More »

Screensavers and Locked Screens

Screensavers and Locked Screens

Screensavers and Locked Screens: In the past, one of the common ways to gain access to a system to simply look around for an unattended system. In many cases, the system would be left logged in and unlocked by a user who was going to step away “for a moment” …

Read More »

Passwords and Physical Security

Passwords and Physical Security

Passwords and Physical Security: Passwords are perhaps one of the best primary lines of defense for an environment. Although not commonly thought of as a protective measure for physical intrusions, they do indeed fulfill this purpose. However, the downside is that unless passwords are carefully and thoughtfully implemented they tend …

Read More »

Scripting Errors

Scripting Errors

Scripting Errors: Web applications, programs, and code such as Common Gateway Interface (CGI), ASP.NET and JavaServer Pages (JSP) are commonly in use in web applications and present their own issues. Vulnerabilities such as a lack of input validation scripts can be a liability. A savvy hacker can use a number …

Read More »

Know What Information Is Available

Know What Information Is Available

Know What Information Is Available About You: If you have Google yourself, you have learned firsthand what is available about you online, but you probably missed a quite a bit. If you have not done so already, try Googling yourself: See what types of information are available, and note that …

Read More »

Pakistani Citizens Information Is Not More PRIVATE

Pakistani Citizens Information Is Not More PRIVATE

Pakistani Citizens Information Is Not More Private: The hackers have the complete details of every single individual in Pakistan, their NADRA details, Phone Call Details, Telecom Details, Driving License Details, and if these details go into the wrong hands they can destroy someone innocents life. Behind this all vulnerable Websites, …

Read More »