Skip to main content

Home/ ACSE Discussion/ Group items tagged risks

Rss Feed Group items tagged

Doug Peterson

Building Secure Web Applications Infographic - 0 views

  •  
    "Neglecting to take proper security measures at the application layer is one of the most common causes of data breaches, yet many companies still leave their applications unprotected. Securing your applications begins with developer training on the risks applications face and the methods required for vulnerability prevention. This infographic focuses on defining these risks and combating common flaws."
tech vedic

E-Commerce Security Tips - 0 views

  •  
    With every innovation of e-commerce, consumers are exposed to new security risks. Talking about U.S. e-commerce sales, it is expected to grow about 12 percent in 2013. Thus, making transactions safe online is a quite difficult job now. In this tutorial, we are introducing five fundamental security tips which you should keep in mind for embracing this dynamic industry.
Doug Peterson

Google Online Security Blog: Protecting data for the long term with forward secrecy - 0 views

  •  
    Last year we introduced HTTPS by default for Gmail and encrypted search. We're pleased to see that other major communications sites are following suit and deploying HTTPS in one form or another. We are now pushing forward by enabling forward secrecy by default. Most major sites supporting HTTPS operate in a non-forward secret fashion, which runs the risk of retrospective decryption. In other words, an encrypted, unreadable email could be recorded while being delivered to your computer today. In ten years time, when computers are much faster, an adversary could break the server private key and retrospectively decrypt today's email traffic.
tech vedic

How to secure your Tablet? - 0 views

  •  
    Using a wireless technology for browsing websites, checking mails, chatting on social networking sites, etc. is very common nowadays. But, this easy networking comes at a risk. Let's go through this tutorial for making your web browsing safer in tablets.
tech vedic

How to fix your biggest Internet security risk? - 0 views

  •  
    Threats related to Java programming language are increasing day by day. It also reminds about the old whack-a-mole arcade game. With the vulnerable version of Java, your computer becomes prone to malware or other threats.
Doug Peterson

Dangers of IE 'Cookiejacking': What You Need to Know | PCWorld - 0 views

  •  
    A security researcher has discovered a means of hijacking sensitive information from cookies in Internet Explorer. The 'cookiejacking' technique could expose credentials from Facebook, Twitter, Gmaiil, or other online services, but Microsoft doesn't consider it a serious threat. So, is the sky falling, is the security researcher crying wolf, or is the real risk somewhere in between.
tech vedic

Top 5 enterprise security threats - 0 views

  •  
    Nowadays, the list of security concerns is getting bigger and bigger. All enterprises have five types of security threats. Here in this tutorial, let's uncover these top five security threats of enterprises.
Peter McAsh

INFOGRAPHIC : Software Piracy - The Untold Tales - 0 views

  •  
    Piracy and illegal file sharing is a curse for any developer and software company.  As soon as the new version of a popular piece of software hits the streets, it is pretty much being pirated before you can say "o-arrr!".  Same with games, music and movies.  For every person who buys something legally, there's probably 10 who are taking the risk of stealing it.
1 - 8 of 8
Showing 20 items per page