Skip to main content

Home/ ACSE Discussion/ Group items tagged security

Rss Feed Group items tagged

Doug Peterson

Secure web browsing cracked by BEAST | Naked Security - 0 views

  •  
    A pair of researchers have unveiled a serious new attack on web browser security. The researchers used this week's Ekoparty security conference in Buenos Aires to unveil a new tool that attacks TLS and SSL, the cryptographic protocols used to establish secure web connections.
tech vedic

Top 5 enterprise security threats - 0 views

  •  
    Nowadays, the list of security concerns is getting bigger and bigger. All enterprises have five types of security threats. Here in this tutorial, let's uncover these top five security threats of enterprises.
Doug Peterson

Building Secure Web Applications Infographic - 0 views

  •  
    "Neglecting to take proper security measures at the application layer is one of the most common causes of data breaches, yet many companies still leave their applications unprotected. Securing your applications begins with developer training on the risks applications face and the methods required for vulnerability prevention. This infographic focuses on defining these risks and combating common flaws."
tech vedic

How to know that my computer is virus or malware infected? - 0 views

  •  
    Malware, as you know is a class of malicious software such as spyware, adware, or viruses that compromise with the system's performance and security. And in majority of cases they infiltrate through general Internet activities --- browsing, surfing, and downloading, or executing programs or files. Hence, most of the virus or malware defense methods are based on encouraging secure Internet access. Though, virus or malware authors are using astute development techniques, keeping a keen eye on the behavior of your machine, can be helpful in winning the battle of computer security. Following are a few notable symptoms, which can be perceived as an indication of virus or malware attack:
tech vedic

E-Commerce Security Tips - 0 views

  •  
    With every innovation of e-commerce, consumers are exposed to new security risks. Talking about U.S. e-commerce sales, it is expected to grow about 12 percent in 2013. Thus, making transactions safe online is a quite difficult job now. In this tutorial, we are introducing five fundamental security tips which you should keep in mind for embracing this dynamic industry.
tech vedic

Why don't you need to install a third-party firewall (and when you do)? - 0 views

  •  
    Firewall is an important part of computer security. And, you often get people selling you a new one. Windows always come with its solid firewall. This tutorial contains the answers of some important questions related to firewall security.
tech vedic

How to check USB drives from spreading viruses? - 0 views

  •  
    Sometimes being unaware of the USB virus-or malware-infection, you may put your computer security at stake. The AutoPlay feature of the Windows, executes the file or program stored on your device, without asking for permission, and that may bring havoc on the operating system as well as the confidential data stored on the machine. Thus, you need to disable the AutoPlay feature to deter such security breaching.
tech vedic

How to clear off viruses and malware from an infected PC? - 0 views

  •  
    Despite updated operating system, browser, browser add-ons, installed firewall, and acute computer security settings, clever viruses, spyware or Trojans may find loop-holes to slip into your system. Not only in terms of performance, but in terms of stability and security too, these malicious software push you on back-foot. What to do next?
Doug Peterson

Digital Society » Blog Archive » Online services security report card - 0 views

  •  
    A lot of website security awareness has been raised over the last week since the release of a simple-to-use website user account hijacking tool called FireSheep.  The tool gives attackers temporary full access to your web accounts like Facebook, Twitter, and Microsoft Hotmail.
Doug Peterson

Mozilla Firefox 3.6.9 Security Updates Follow Microsoft's Lead - www.esecurityplanet.com - 0 views

  •  
    Mozilla is improving the security of its open source Firefox Web browser this week with the help of a feature that originally debuted last year in Microsoft's rival Internet Explorer browser.
Peter McAsh

Top ten password cracking techniques | Security | Features | PC Pro - 2 views

  •  
    Think your passwords are secure? Think again If you want to ensure your password, and the data it protects, is as secure against hackers as possible then be sure to read The Ultimate Guide to Passwords in the upcoming issue of PC Pro, on sale next week.
tech vedic

KEYS TO A SECURE PASSWORD - 0 views

  •  
    Are you in a habit of using short or same passwords? Then change it now. Online world is becoming risky day by day. Hackers are always ready to hack your account and thus, it is your responsibility to protect yourself against cyber-crimes. We are providing you important tips to create strong as well as secure password.
Doug Peterson

iOS 4.2 to Fix iOS 4.1 Lockscreen Security Flaw | Redmond Pie - 0 views

  •  
    Apple Acknowledges iOS 4.1 Security Flaw. Will Fix it in November with iOS 4.2
Doug Peterson

SSL Search : - Web Search Help - 0 views

  •  
    With Google search over SSL, you can have an end-to-end encrypted search solution between your computer and Google. This secured channel helps protect your search terms and your search results pages from being intercepted by a third party. This provides you with a more secure and private search experience.
Doug Peterson

Dangers of IE 'Cookiejacking': What You Need to Know | PCWorld - 0 views

  •  
    A security researcher has discovered a means of hijacking sensitive information from cookies in Internet Explorer. The 'cookiejacking' technique could expose credentials from Facebook, Twitter, Gmaiil, or other online services, but Microsoft doesn't consider it a serious threat. So, is the sky falling, is the security researcher crying wolf, or is the real risk somewhere in between.
Peter McAsh

6 weird malware tricks hackers use to bypass security - 0 views

  •  
    6 weird malware tricks hackers use to bypass security Security experts presenting in the upcoming SecTor conference reveal six new tactics that cyber criminals are employing to circumvent security and avoid detection.
Doug Peterson

Good to Know - Google - 2 views

  •  
    Advice for staying more secure on the web and an overview of some of the security tools that Google offers.
Doug Peterson

Click on an Anonymous link, and you could be DDoS'ing the US government | Naked Security - 0 views

  •  
    Overnight, websites belonging to the FBI, Department of Justice, RIAA, MPAA, Universal and others were struck by a distributed denial-of-service (DDoS) attack.
Doug Peterson

Mat Honan details the Amazon and Apple security flaws that let hackers wipe his MacBook... - 0 views

  •  
    "Late Friday, Wired writer Mat Honan ran into a digital buzzsaw as his iCloud, Gmail and Twitter accounts were compromised in rapid succession. The hackers did a tremendous amount of collateral damage along the way, spewing racist and homophobic tweets on Honan's account plus the Gizmodo Twitter account (linked to his). Worse, they proceeded to wipe all the data from his iPhone, iPad and his Mac laptop via Find My iPhone and Find My Mac."
1 - 20 of 79 Next › Last »
Showing 20 items per page