Security

25K

Solutions

24K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.

Share tech news, updates, or what's on your mind.

Sign up to Post

This utility will help to identify the hash value of the application, which will help to protect computers from the various attacks.
0
LVL 35

Expert Comment

by:Terry Woods
Comment Utility
It's worth noting, for those who aren't aware, that MD5 is a broken algorithm for security use. If there is a stronger alternative algorithm available to be used, it would be a good idea to use it.

Further reading:
https://www.zdnet.com/article/ssl-broken-hackers-create-rogue-ca-certificate-using-md5-collisions/
https://blog.avira.com/md5-the-broken-algorithm/
0
Cloud Class® Course: MCSA MCSE Windows Server 2012
LVL 12
Cloud Class® Course: MCSA MCSE Windows Server 2012

This course teaches how to install and configure Windows Server 2012 R2.  It is the first step on your path to becoming a Microsoft Certified Solutions Expert (MCSE).

Wifi Flaw
Nothing is ever secure - things get "broken" but not always easily mended. This is the norm today. Despite security measure put in place, cyber attacks are still successful because security controls themselves can be vulnerable as well. Catch this Wi-Fi security weakness run through.
5
The NEO Coolcam's webcam bypasses the login and multiple remote code execution vulnerabilities bases on stack overflow and data analysis report.
0
Best Cloud Security Company
Today most organizations have shifted their work to the cloud. In every corner of the world, users are making use of cloud services which can increase cyber attacks. None of us are secure from cyber attacks and data breaches. These issues provided an opportunity for Cloud Security Companies.
0
SysTools Endpoint Security
The review page draws the attention of readers towards the best endpoint security vendor i.e., SysTools Enterprise endpoint protection software. It is available easily in the digital market and offers top-level services at an affordable price.
0
Secure HTTPS
HTTPS is an essential technology and the Chrome browser developed by Google now shows “Secure” in the address bar when you visit a page with the HTTPS protocol such as https://www.experts-exchange.com but what does this mean? Is the website secure from malware? Is our identity secure?
0
online safety

A recent Pew Research Center study reveals that one in three parents expresses concern about their children’s online activity. In today’s digital world, understanding the online activity of children is part of being a parent. Most people understand that virus protection and software updates are important for preserving online security. However, the personal habits and actions of young Internet users can affect their safety. 


Busy parents don’t always have time to stay informed about the latest Internet threats, making cybersecurity experts an invaluable resource for providing online safety information about protecting children and young adults. Still, parents must remain vigilant in staying informed about what social media platforms their children use as well as explaining the primary tenets of Internet safety.


Parents, as well as young Internet users, need cyber safety education. It’s important that youth understand how their social media activities affect their safety. It’s impossible to know who is reading and following media posts left by children, and security is often the last concern on the mind of an unsuspecting Internet user engaging with friends and family members.


Most parents make it a point to always know the whereabouts of their children. The same concern should apply to online activity. Parents should have a presence on their children’s gaming networks and social media platforms. Additionally, parents should have the account and password information of their children’s online accounts. Not to spy, but to verify their activities. Furthermore, it’s incredibly easy for unscrupulous individuals to track the real-world movements of children as they check into venues using online applications by using social media platforms such as Instagram, Snapchat, Facebook, and Foursquare. 


Keeping Kids Safe in the Digital Domain


Parents should do their best to teach their children about online safety. However, it shouldn’t be left to parents alone to keep their children safe online. Community advocates and cybersecurity specialists can pitch in and do their part to help keep kids safe in the digital domain. Additionally, there are paid services that parents can use to help protect their children online. Most computer literate children understand how to protect their online privacy and security. However, they only use this knowledge to keep their parents from observing their online activity. 


Unfortunately, most children don’t apply this same caution when engaging with strangers online. Just as they do in the real world, parents must figure out how to oversee their children’s Internet activity. Additionally, it’s important that they establish online monitoring while children are young so that it’s easier to protect them as they grow older.


Research shows that parents are the best defense for protecting kids, teens and young adults online. Parents can establish a foundation for monitoring their children’s Internet activity by explaining that they want to share in their online experience, not infringe on their privacy. This process is easier if parents maintain an ongoing dialogue with their children about Internet safety. Parents must make sure that their children understand how their online activity exposes personal information about their lives that build up over time. 


Getting Help With Cyber Safety


Social monitoring apps and other resources can help parents stay informed about their children’s online behavior and keep them safe. Experts recommend that parents monitor their children closely to protect them from inappropriate content and activities such as cyberbullying and online predators. Sometimes, dishonest individuals pose as children online. They may even encourage children to divulge personal information, such as their home address and phone number. In light of these threats, parents should always be aware of their children’s online activities, including the information that they share and the people that they engage with online.


All parents want to keep their children safe as they explore the Internet, learn new things and engage with others from around the world. There are many academic institutions, community organizations and law enforcement and government agencies that provide resources that teach parents how to protect children as they browse the Internet. In fact, there are many directories with hundreds of resources from around the world that are updated frequently, and many of those resources are available in different languages.


In today’s digital world, it’s vital that parents maintain an open dialogue about Internet safety. Additionally, it’s important that cybersecurity experts advocate for the safety of children as they use the Internet to enhance their lives. Cybersecurity experts are well aware of the dangers that children face online, and as new threats emerge daily, they continue to develop innovative solutions for protecting the public’s safety.



0
The biggest challenges when it comes to mobile security: protection, integration and visibility.
3

Expert Comment

by:Jake Lees
Comment Utility
Nice post. Love to read it.
0
Mobile security
Your smartphone is the weakest link so if we have not been taking good care of it and looking out for signs of red flag that the it is misbehaving and acting strangely, then we are setting ourselves for trouble. Read on for tips to self defence and keep a clean hygiene footprint.
2
LVL 67

Author Comment

by:btan
Comment Utility
Thanks Andrew.

1a. Facial spoofing attacks can easily launched via printed photos, video replays and 3D masks of a face. There is a detailed paper written on this. That is why it is critical to implement strong liveness detection measures for facial authentication that recognize when a facial image is not a live. To share a bit more, spoof detection can be classified as either “active”, requiring interaction with the subject, or “passive” analysis requiring no interaction.  

1b. Fingerprint spoofing attack can easily be fooled by fake fingerprints digitally composed of many common features found in human prints. Likewise another paper shares the details. What I think is concerning is the capture in the past has also been attempted on gummy fingers that is fake Fingers. Liveness test is still the added assurance check needed to have a robust check in the mobile device.

The challenge for a/m is not on the detection technology but how to more towards a more accurate match rate an d at the same time not in the expense of making the device bulky or more draining to the limited battery level.

2. Actually remote wipe is more of a mitigation as ultimately, if the data remain encrypted and the device has lock enabled, access is restricted and even data siphoned off the shutdown or locked device will not necessary have the plain data revealed. So with encryption and locked setting, the mitigation suffice as baseline.

Hope the above clarifies.
1
LVL 19

Expert Comment

by:Andrew Leniart
Comment Utility
Thanks for clarifying btan. Highly useful information!
0
Secure Mobile DNA
The explosive trends of the increasing number of mobile devices and apps get us in trouble despite the benefits they give. Run through the common threats faced. Tackle them with a strategy to better secure our mobile device and apps against these emerging threats.
0
Powerful Yet Easy-to-Use Network Monitoring
Powerful Yet Easy-to-Use Network Monitoring

Identify excessive bandwidth utilization or unexpected application traffic with SolarWinds Bandwidth Analyzer Pack.

Keeping businesses intact and secure is a skill which individuals lack. All you need is 5 social security tips to start to turn things around
0
HIVE ALERT!
With a HIVE alert mind, we can focus on important security areas. We can ask the right questions to guide and discover ways to reduce our risk footprint and protect against lurking threats. Read on...
0

If you're having problems where a lot of messages that Cisco Cloud Email Security would normally filter out have been coming in, it appears to be the result of an upgrade gone wrong. In our case, it took a P1 ticket to get resolved.


We found evidence of an issue by looking at the incoming mail policies (accessible by going to Mail Polices > Incoming Mail Policies):



You will notice that the Anti-Spam, Anti-Virus, and Graymail columns are all showing "Not Available". That is because they are all disabled. These all need to be enabled to get things working normally again.


When we accessed the Cisco IronPort Anti-Spam settings, it showed that it was globally turned off. (This can be accessed by going to Security Services > IronPort Anti-Spam).



However, we were completely unable to turn anything on, regardless of access level (I'm a Cloud Administrator, but my coworker is an Administrator).


The cause of the problem: Cisco upgrading our appliance, and it turned out the feature keys somehow got blown out. In setting them back in, there is a requirement of accepting an End User License Agreement. Somewhere within this area is where Cisco failed to properly handle things.


Resolving this required creating a ticket with Cisco (initially a P3 ticket, which eventually got escalated to P1). If you're seeing yourself with this exact same issue, know you're not alone. Hopefully, Cisco fixes this for all of their CES customers in one swoop, but just watch out for this just in case. 


This problem started this past Friday morning for us but has just gotten resolved as I'm creating this post. While getting the ticket resolved, I highly recommend requesting that Cisco adds an email address from your organization to Atlas so that you're notified of when upgrades are planned to take place.

1
Managed Security Services Providers
This blog is going to brief readers about a new way for enterprise cloud data protection i.e., Managed security services. One will come to know the business challenges in securing data faced in the current scenario and get familiar with ‘what is MSS in cloud’ with all associated technicalities.
0
Coming up with a good network security checklist can be challenging. The list below was created with input from not less than a dozen technology consultants and security experts.
4
LVL 98

Author Comment

by:Lee W, MVP
Comment Utility
Not a bad point.  BUT, keep in mind the general target audience is small to midsize companies and the consultants they use.  2FA on a Windows Domain in those environments isn't commonplace (I've not heard of any really good, really SMB affordable solutions... at least none come to mind).

If you have any recommendations, please feel free to make them.
0

Expert Comment

by:kevin_lovegrove
Comment Utility
I'd personally recommend ManageEngine PMP, it does a whole lot more than 2FA and I think the prices are very reasonable considering the risks it mitigates.

https://www.manageengine.com/products/passwordmanagerpro/

It supports a number of 2FA solutions:

https://www.manageengine.com/products/passwordmanagerpro/two-factor-authentication.html
0
Fraud Alert
Hackers are getting into PayPal accounts, then using eBay accounts to make purchases and have them shipped to an intermediary address that redirects the package overseas. If you ship to them, good luck getting your money or your item back.
0
The New York State Cybersecurity Conference is held most years in Albany, New York. This year, like last, it was held in the Egg conference center in Nelson Rockefeller Plaza. This was the 21st annual conference. Here are some of my reflections ...
1
LVL 19

Expert Comment

by:Andrew Leniart
Comment Utility
Great overview of the conference. Thanks for sharing this. Endorsed!
0
A discussion and explanation about Application and Security issues in Wireless Sensor Networks
0
Ransomware
Ransomware is a malicious software that encrypts a victim's data and makes it unusable until the victim pays the attacker a ransom fee in Bitcoin. Ransomware uses cryptography technology. Attackers decrypt the files only if the victims pays the bitcoin amount within a certain period of time.
0
LVL 8

Expert Comment

by:Naveen Sharma
Comment Utility
Thanks for sharing.

Ransomware attacks are becoming problematic for both individuals and businesses of all sizes.

The best and the most important mitigation techniques is to maintain secure backups and educate your employees.

Ways to Address Ransomware Attacks in Today’s Security Landscape:
https://www.lepide.com/blog/nine-ways-to-address-ransomware-attacks-in-todays-security-landscape/

Simple things you can do to protect against ransomware attacks:
http://expert-advice.org/security/ways-to-protect-yourself-from-ransomware-attack/
0
The Ultimate Tool Kit for Technolgy Solution Provi
The Ultimate Tool Kit for Technolgy Solution Provi

Broken down into practical pointers and step-by-step instructions, the IT Service Excellence Tool Kit delivers expert advice for technology solution providers. Get your free copy for valuable how-to assets including sample agreements, checklists, flowcharts, and more!

SIEM must examine concepts of normality and abnormality traffic/data flow patterns. SIEM need to constitute use of adaptive intelligence. Companies need to evaluate SIEM products based on their own objectives to determine the product that best meet their needs.
2

Expert Comment

by:Gökhan POLAT
Comment Utility
Great article 👍
0
THREAT RISK TABLET
Know thy enemy but not yourself, wallow in defeat every time. We are fearful of what we do not know. Taking an extra step to self discover though we are not an expert is worthwhile to better focus and assess the cyber threat. Find out more in this article.
0
Free PDF Watermark Creator
To make data more confidential it is needed to generate a watermark on a PDF file. So, read the blog and get the complete knowledge about PDF watermarking. Also, learn simple ways to insert watermark in PDF files.
0
Facebook Privacy
Mark Zuckerberg fell quite far out of grace and an outraged public have manifestly quit Facebook encouraging others to do the same. But is it the answer?
0
Security on computers should be like an onion, with many layers that need to be peeled off one before the next. Read on to find out how to make your computer more secure.
0
PDF Restriction Remover
Here is the list of top 3 best PDF Restriction Remover software with their key features and pros and cons. One can choose the specific PDF security remover program according to their need.
0

Security

25K

Solutions

24K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.