Wednesday , August 22 2018

July, 2018

  • 26 July

    VIRTUALIZATION AND DISTRIBUTED COMPUTING

    VIRTUALIZATION AND DISTRIBUTED COMPUTING

    Virtualization and distributed computing have revolutionized the computing world, bringing the wholesale changes to the applications, services, system data, and the data centers. VIRTUALIZATION Virtualization adds software between an operating system and the underlying computer hardware. This allows multiple “guest” operating systems to run simultaneously on one physical “host” computer. …

  • 24 July

    Types of Biometric Controls

    Types of Biometric Controls

    There are a number of biometric controls that are used today; below we have the major implementations and their specific pros and cons with regards to access control security.   Fingerprints Fingerprints are the most widely used biometric control available today. Smartcards can carry fingerprint information. Many U.S government office …

  • 23 July

    Facial Recognition – What You Are About to See Will Shock You

    Facial Recognition - What You Are About to See Will Shock You

    The Human face plays extremely important rule in our society interactions, which helps conveying the people’s identity. Using the Human face as a key to security, the biometric face recognition technology has received tremendous  attention in the past several years due to its potential for a wide variety of applications …

  • 22 July

    Hackers Steal $1 Million From Russian Bank Due to Unpatched Router

    Hackers Steal $1 Million From Russian Bank Due to Unpatched Router

    An infamous attacker group has stolen over a million dollars from the PIR Bank in Russia after it breached the bank’s network via an unpatched router. The victim lost around $920,000 in funds which were being kept in a corresponding Bank of Russia account. The Russian Cyber Security firm, Group …

  • 21 July

    Data Breach Exposes Trade Secrets of Carmakers GM, Ford, Tesla, Toyota

    Data Breach Exposes Trade Secrets of Carmakers GM, Ford, Tesla, Toyota

    The Security Researchers from UpGuard Cyber Risk has reported on Friday that the sensitive documents from more than over 100 manufacturing companies, which do includes the GM, Fiat Chrysler, Ford, Tesla, Toyota, ThyssenKrupp, and VW were exposed on the publicly accessible server belonging to level One Robotics. The exposure comes …

  • 19 July

    Facebook Can Now Sync Your Instagram Contacts to Messenger

    Facebook Can Now Sync Your Instagram Contacts to Messenger

    Facebook wants to grow your messenger contact list with a help of Instagram. The company has just launched a new feature in Messenger that pulls your contacts from Instagram, if you want to opt to connect your account. The option appears in the Messenger’s “People” tab, alongside the existing option …

  • 18 July

    Russia Prevented Over 25 Million Cyber Attacks During World Cup

    Russia Prevented Over 25 Million Cyber Attacks During World Cup

    Russia has successfully prevented nearly over 25 million cyber attacks and as well as other criminal acts during the football World Cup, according to Kremlin. The Moscow Time has reported that Russian President Mr. Vladimir Putin Congratulate the country’s security forces along with the international cooperation, which is ensuring a …

  • 17 July

    Soon You will Pay For Goods With the Palm of Your Hand

    The Aeon Financial Service Company and their subsidiary AEON Credit Service along with Fujitsu announced that Fujitsu and AEON Credit Services are going to start the new revolutionary cardless payment system. This system which will be utilizing the Fujitsu’s own palm vein biometric authentication tech. In the very start of …

  • 16 July

    PERSONNEL SECURITY

    PERSONNEL SECURITY

    Users can pose the biggest security risk to an organization. Background checks should be performed, contractors who needs to be securely managed, and the users ought to be properly trained and made aware of the security risks, as we will discuss next. Security Awareness and Training Security awareness and training …

  • 16 July

    Misconceptions About Incognito Mode

    Study Shows Misconceptions Regarding Incognito & Private Mode

    Study Shows Misconceptions Regarding Incognito & Private Mode: The researchers from the University of Chicago have found out that there is a lot of misconception regarding incognito mode among the users. Many of which the users thing that their employers or the ISPs would not be able to check out …