[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x

Security

25K

Solutions

24K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.

Share tech news, updates, or what's on your mind.

Sign up to Post

PDF Unlocker for Mac
Want to remove a security password from PDF files? Know simple tips and tricks to remove security and restrictions from PDF files on a Mac OS X. Follow each step carefully to unprotect an Adobe PDF document.
0
Challenges in Government Cyber Security
Challenges in Government Cyber Security

Has cyber security been a challenge in your government organization? Are you looking to improve your government's network security? Learn more about how to improve your government organization's security by viewing our on-demand webinar!

Data loss can hit a business in any number of ways, from employees accidentally deleting information and hardware failure to natural disasters and cyberattacks wiping out your systems.
1
Enroll in these four OWASP courses: Avoiding Hacker Tricks, Forgery and Phishing, Proactive Controls, and Threats Fundamentals. Also learn a basic introduction to web design where you can implement these OWASP security measures.
2
Blockwell.ai KYC Casper Token "Psoriasis Advertising" Event Analysis
0
In April 2018, the "SamSam" ransomware attack crippled the city of Atlanta. The recovery that followed provides a stark reminder of the real costs associated with ransomware – both technologically and financially.
0
This article documents the process of assigning different password policies based on user account password strength. The result of this script is that all the users that are using weak passwords are forced to have a password policy on them that allows their passwords to be valid for fewer days.
2
ITSec vs CSec
I am sure that most of you will have chanced upon either of the terms like "Information (IT) Security" and "Cybersecurity" but do you know the differences and the implications as those threats evolve? Find out more in this article on the different security approaches that should be adopted.
1
Data integrity is the paramount concern when determining any form of a disaster recovery related solution. If a solution cannot preserve and guarantee the integrity of data placed in its trust, then the solution is of no value to an organization.
5
Newly released Acronis True Image 2019 includes their battle-tested anti-ransomware defense
1
LVL 17

Expert Comment

by:William Fulks
Comment Utility
Bagaudin - thanks for replying! This was with the 2015 version I purchased for work a while back. With previous versions we used to maintain a bank of system images and all that - for tech support - and with this new one because of the licensing it was limiting us to one machine. I also upgraded from a HD to an SSD and the process of making the image and restoring kept throwing errors even though both drives were fine. I eventually just quit using it and haven't in a couple of years.
0
LVL 1

Expert Comment

by:Bagaudin Satuev
Comment Utility
Thanks for the detailed feedback, William!

I dearly hope that if (when) you consider our products again - you'll let me or any other Acronis vendor expert know.
0
The Scavenging Attacks of Ethereum's stolen currency in"Post-Smuggling Era".
0
HTML5 and CSS3 Fundamentals
LVL 12
HTML5 and CSS3 Fundamentals

Build a website from the ground up by first learning the fundamentals of HTML5 and CSS3, the two popular programming languages used to present content online. HTML deals with fonts, colors, graphics, and hyperlinks, while CSS describes how HTML elements are to be displayed.

'Ethereum Smart Contract Specification Issue' Impact Analysis
0
This utility will help to identify the hash value of the application, which will help to protect computers from the various attacks.
0
LVL 36

Expert Comment

by:Terry Woods
Comment Utility
It's worth noting, for those who aren't aware, that MD5 is a broken algorithm for security use. If there is a stronger alternative algorithm available to be used, it would be a good idea to use it.

Further reading:
https://www.zdnet.com/article/ssl-broken-hackers-create-rogue-ca-certificate-using-md5-collisions/
https://blog.avira.com/md5-the-broken-algorithm/
0
Wifi Flaw
Nothing is ever secure - things get "broken" but not always easily mended. This is the norm today. Despite security measure put in place, cyber attacks are still successful because security controls themselves can be vulnerable as well. Catch this Wi-Fi security weakness run through.
5
The NEO Coolcam's webcam bypasses the login and multiple remote code execution vulnerabilities bases on stack overflow and data analysis report.
0
Best Cloud Security Company
Today most organizations have shifted their work to the cloud. In every corner of the world, users are making use of cloud services which can increase cyber attacks. None of us are secure from cyber attacks and data breaches. These issues provided an opportunity for Cloud Security Companies.
0
SysTools Endpoint Security
The review page draws the attention of readers towards the best endpoint security vendor i.e., SysTools Enterprise endpoint protection software. It is available easily in the digital market and offers top-level services at an affordable price.
0
Secure HTTPS
HTTPS is an essential technology and the Chrome browser developed by Google now shows “Secure” in the address bar when you visit a page with the HTTPS protocol such as https://www.experts-exchange.com but what does this mean? Is the website secure from malware? Is our identity secure?
0
online safety

A recent Pew Research Center study reveals that one in three parents expresses concern about their children’s online activity. In today’s digital world, understanding the online activity of children is part of being a parent. Most people understand that virus protection and software updates are important for preserving online security. However, the personal habits and actions of young Internet users can affect their safety. 


Busy parents don’t always have time to stay informed about the latest Internet threats, making cybersecurity experts an invaluable resource for providing online safety information about protecting children and young adults. Still, parents must remain vigilant in staying informed about what social media platforms their children use as well as explaining the primary tenets of Internet safety.


Parents, as well as young Internet users, need cyber safety education. It’s important that youth understand how their social media activities affect their safety. It’s impossible to know who is reading and following media posts left by children, and security is often the last concern on the mind of an unsuspecting Internet user engaging with friends and family members.


Most parents make it a point to always know the whereabouts of their children. The same concern should apply to online activity. Parents should have a presence on their children’s gaming networks and social media platforms. Additionally, parents should have the account and password information of their children’s online accounts. Not to spy, but to verify their activities. Furthermore, it’s incredibly easy for unscrupulous individuals to track the real-world movements of children as they check into venues using online applications by using social media platforms such as Instagram, Snapchat, Facebook, and Foursquare. 


Keeping Kids Safe in the Digital Domain


Parents should do their best to teach their children about online safety. However, it shouldn’t be left to parents alone to keep their children safe online. Community advocates and cybersecurity specialists can pitch in and do their part to help keep kids safe in the digital domain. Additionally, there are paid services that parents can use to help protect their children online. Most computer literate children understand how to protect their online privacy and security. However, they only use this knowledge to keep their parents from observing their online activity. 


Unfortunately, most children don’t apply this same caution when engaging with strangers online. Just as they do in the real world, parents must figure out how to oversee their children’s Internet activity. Additionally, it’s important that they establish online monitoring while children are young so that it’s easier to protect them as they grow older.


Research shows that parents are the best defense for protecting kids, teens and young adults online. Parents can establish a foundation for monitoring their children’s Internet activity by explaining that they want to share in their online experience, not infringe on their privacy. This process is easier if parents maintain an ongoing dialogue with their children about Internet safety. Parents must make sure that their children understand how their online activity exposes personal information about their lives that build up over time. 


Getting Help With Cyber Safety


Social monitoring apps and other resources can help parents stay informed about their children’s online behavior and keep them safe. Experts recommend that parents monitor their children closely to protect them from inappropriate content and activities such as cyberbullying and online predators. Sometimes, dishonest individuals pose as children online. They may even encourage children to divulge personal information, such as their home address and phone number. In light of these threats, parents should always be aware of their children’s online activities, including the information that they share and the people that they engage with online.


All parents want to keep their children safe as they explore the Internet, learn new things and engage with others from around the world. There are many academic institutions, community organizations and law enforcement and government agencies that provide resources that teach parents how to protect children as they browse the Internet. In fact, there are many directories with hundreds of resources from around the world that are updated frequently, and many of those resources are available in different languages.


In today’s digital world, it’s vital that parents maintain an open dialogue about Internet safety. Additionally, it’s important that cybersecurity experts advocate for the safety of children as they use the Internet to enhance their lives. Cybersecurity experts are well aware of the dangers that children face online, and as new threats emerge daily, they continue to develop innovative solutions for protecting the public’s safety.



0
The biggest challenges when it comes to mobile security: protection, integration and visibility.
4

Expert Comment

by:Jake Lees
Comment Utility
Nice post. Love to read it.
0
Defend Against the Q2 Top Security Threats
Defend Against the Q2 Top Security Threats

Were you aware that overall malware worldwide was down a surprising 42% from Q1'18? Every quarter, the WatchGuard Threat Lab releases an Internet Security Report that analyzes the top threat trends impacting companies worldwide. Learn more by viewing our on-demand webinar today!

Mobile security
Your smartphone is the weakest link so if we have not been taking good care of it and looking out for signs of red flag that the it is misbehaving and acting strangely, then we are setting ourselves for trouble. Read on for tips to self defence and keep a clean hygiene footprint.
2
LVL 68

Author Comment

by:btan
Comment Utility
Thanks Andrew.

1a. Facial spoofing attacks can easily launched via printed photos, video replays and 3D masks of a face. There is a detailed paper written on this. That is why it is critical to implement strong liveness detection measures for facial authentication that recognize when a facial image is not a live. To share a bit more, spoof detection can be classified as either “active”, requiring interaction with the subject, or “passive” analysis requiring no interaction.  

1b. Fingerprint spoofing attack can easily be fooled by fake fingerprints digitally composed of many common features found in human prints. Likewise another paper shares the details. What I think is concerning is the capture in the past has also been attempted on gummy fingers that is fake Fingers. Liveness test is still the added assurance check needed to have a robust check in the mobile device.

The challenge for a/m is not on the detection technology but how to more towards a more accurate match rate an d at the same time not in the expense of making the device bulky or more draining to the limited battery level.

2. Actually remote wipe is more of a mitigation as ultimately, if the data remain encrypted and the device has lock enabled, access is restricted and even data siphoned off the shutdown or locked device will not necessary have the plain data revealed. So with encryption and locked setting, the mitigation suffice as baseline.

Hope the above clarifies.
1
LVL 21

Expert Comment

by:Andrew Leniart
Comment Utility
Thanks for clarifying btan. Highly useful information!
0
Secure Mobile DNA
The explosive trends of the increasing number of mobile devices and apps get us in trouble despite the benefits they give. Run through the common threats faced. Tackle them with a strategy to better secure our mobile device and apps against these emerging threats.
0
Keeping businesses intact and secure is a skill which individuals lack. All you need is 5 social security tips to start to turn things around
0
HIVE ALERT!
With a HIVE alert mind, we can focus on important security areas. We can ask the right questions to guide and discover ways to reduce our risk footprint and protect against lurking threats. Read on...
0

If you're having problems where a lot of messages that Cisco Cloud Email Security would normally filter out have been coming in, it appears to be the result of an upgrade gone wrong. In our case, it took a P1 ticket to get resolved.


We found evidence of an issue by looking at the incoming mail policies (accessible by going to Mail Polices > Incoming Mail Policies):



You will notice that the Anti-Spam, Anti-Virus, and Graymail columns are all showing "Not Available". That is because they are all disabled. These all need to be enabled to get things working normally again.


When we accessed the Cisco IronPort Anti-Spam settings, it showed that it was globally turned off. (This can be accessed by going to Security Services > IronPort Anti-Spam).



However, we were completely unable to turn anything on, regardless of access level (I'm a Cloud Administrator, but my coworker is an Administrator).


The cause of the problem: Cisco upgrading our appliance, and it turned out the feature keys somehow got blown out. In setting them back in, there is a requirement of accepting an End User License Agreement. Somewhere within this area is where Cisco failed to properly handle things.


Resolving this required creating a ticket with Cisco (initially a P3 ticket, which eventually got escalated to P1). If you're seeing yourself with this exact same issue, know you're not alone. Hopefully, Cisco fixes this for all of their CES customers in one swoop, but just watch out for this just in case. 


This problem started this past Friday morning for us but has just gotten resolved as I'm creating this post. While getting the ticket resolved, I highly recommend requesting that Cisco adds an email address from your organization to Atlas so that you're notified of when upgrades are planned to take place.

1
Managed Security Services Providers
This blog is going to brief readers about a new way for enterprise cloud data protection i.e., Managed security services. One will come to know the business challenges in securing data faced in the current scenario and get familiar with ‘what is MSS in cloud’ with all associated technicalities.
0

Security

25K

Solutions

24K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.