Wednesday , June 20 2018

TimeLine Layout

June, 2018

  • 14 June

    Apple to Close iPhone Security Hole That Police Use to Crack Devices

    An update Apple is planning for its iPhone software would close a technological loophole that law enforcement agencies have exploited to gain access to information on those devices.CreditElizabeth D. Herman for The New York Times

    SAN FRANCISCO — Apple has mentioned the iPhone as one of the secure phone that only the owner could open. Which has led to the battle with law enforcement officials who wants to get the information off them, including a well-publicized showdown with the F.B.I in 2016 after Apple refused …

    Read More »
  • 13 June

    If the Robots Come for Our Jobs, What Should the Government Do?

    A delivery robot rolled through a neighborhood in Philomath, Ore., in April. The robot’s inventor is a native of the town and hopes that with more people shopping online, such robots will take off, reducing traffic and pollution.

    Lots of the smart technologists and futurists are convinced to say that we are on the cusp of a world in which the Artificial Intelligence, robotics and other technologies will make a very huge portion of today’s job obsolete. They might be wrong at this might but if they are …

    Read More »
  • 12 June

    Confidentiality and Strength

    Confidentiality and Strength

    Confidentiality and Strength: One of the major reasons of implement a cryptographic system is to ensure the confidentiality of the information being used. Confidentiality may be intended to prevent the unauthorized disclosures of information in a local network or to prevent the unauthorized disclosure of information across a network. A …

    Read More »
  • 11 June

    Password Attacks

    Password Attacks

    Password Attacks occur when an account is attacked repeatedly. This is accomplished by using applications known as password crackers, which send possible passwords to the account in a systematic manner. The attacks are initially carried out to gain passwords for an access or modification attack. There are several types of …

    Read More »
  • 10 June

    The Principles Behind Social Engineering

    The Principles Behind Social Engineering

    The Principles Behind Social Engineering: A number of principals, or elements, allow social engineering attacks to be effective. Most of these based on our nature to be helpful, or trust other in general, and to believe that there is a hierarchy of leadership that should be followed. For the exam, …

    Read More »
  • 9 June

    Google Promises Its A.I Will Not Be Used For Weapons

    Sundar Pichai, Google’s chief executive, at its annual Google I/O developer conference last month in Mountain View, Calif. On Thursday he laid out objectives for the company’s use of A.I. technology.

    SAN FRANCISCO— Google, reeling from an employee protest over the use of Artificial Intelligence for military purposes, said Thursday that it would not use A.I for weapons or for surveillance that violates human rights. But it will continue to work with governments and the military. These new rules were the …

    Read More »
  • 9 June

    Facebook Bug Changed Privacy Settings of Up to 14 Million Users

    A screen at Facebook’s developer conference last month. During testing over a few days in May, posts that millions of users thought they were creating only for family and friends were visible to the public, the company said Thursday.CreditJason Henry for The New York Times

    SAN FRANCISCO— Facebook has been on struggle for various months the perception that it did not do enough to protect the public privacy. On Thursday, The Company has again stated that they were failed to keep the information of millions of users private. As for over 14 million users of …

    Read More »
  • 8 June

    Understanding Hashing

    Understanding Hashing

    Understanding Hashing: Simply yet, hashing can be considered a type of one-way encryption. More accurately, it is a process that creates a scrambled output that can’t be reversed—or at least can’t be revered easily. The process of hashing takes plain text and transform it into cipher text but does so …

    Read More »
  • 7 June

    “Zip Slip” A Critical Vulnerability Exploited in Zip

    “Zip Slip” A Critical Vulnerability Exploited in Zip

    Zip Vulnerability: A critical vulnerability has been discovered by the security researchers which are impacting many open source coding libraries. The vulnerability is discovered in the Synk, the “Zip Slip” this vulnerability has occurred due to the way coders implement the libraries and plug-ins when decompressing an archive file. Many …

    Read More »
  • 6 June

    Cross Site Scripting

    Cross Site Scripting

    Cross-Site Scripting (XSS) is a type of attack that can occur in many forms, but in general they occur when data of some type enters a web application through an untrusted source (in the major of cases, a web request). Typically, this data is included as part of dynamic content …

    Read More »