Home » Cyber Security

Cracking Stuxnet

Stuxnet was a critical breach at a nuclear power plant, using zero day vulnerabilities that could impact nuclear plants across the globe. Listen to this great video about how it was discovered.  Read More »
 

Safety on Social Networking Websites

Social Networking is a global revolution enabling billions of people around the world to stay in touch with each other. These websites, such as, Twitter, Facebook, YouTube, LinkedIn etc. are built upon traditional concept of social networking-over internet-to connect with family, friends and professional circle, and share photographs, personal content and experiences. In addition, it is used to meet, chat, share interest, and build romantic and business relationships with new people around the world. Moreover, it is used to keep customers and fans... 
 

Tips and Tools to Protect Your PC

A vital part of securing your system is the idea of “defence-in-depth,” or having different layers of security and not relying upon any one methodology or innovation to square all attacks. Take these three Basic Rules for online security, and you will definitely decrease the shots of giving control of your PC to the awful fellows. So, 1) If you didn’t make a go at searching for software, don’t install it; 2) If you install something, upgrade it. 3) If you no more need it, dispose of it! Stay up to date with the latest Updates! It... 
 

Top Five Anti-Virus Products

Great scanning cleanliness and “sound judgment” just get you so far on the web. A decent antivirus utility merits keeping in your pocket on the off chance that both of those two things come up short you (as they have been known to before) or somebody less tech-insightful approaches you for a decent apparatus. Not long from now we’re taking a gander at five of the best antivirus instruments, in light of your assignments. We quickly nixed a few contenders we knew would come up, specifically “nothing,” “OS X/Linux,”... 
 

Top 05 Android Emulators for Windows

The popularity of Android Apps and games has increased in previous couple of years. The updates to the OS itself is a greatest resource for Apps and Games as the OS is truly an exceptionally efficient release and supports numerous applications alongside long document size applications and games. With introduction of the Android Emulators for PCs that furnishes users with a platform on the PC to play games and utilizing applications on the PC or Computer. Despite the fact that these emulators were presented a couple of years ago, due to bugs and... 
 

Tips and Tools to Protect Your PC

A vital part of securing your system is the idea of “defence-in-depth,” or having different layers of security and not relying upon any one methodology or innovation to square all attacks. Take these three Basic Rules for online security, and you will definitely decrease the shots of giving control of your PC to the awful fellows. So, 1) If you didn’t make a go at searching for software, don’t install it; 2) If you install something, upgrade it. 3) If you no more need it, dispose of it! Stay up to date with the latest Updates! It... 
 

Computer Security

It is security applied to computer, smart phones, computer network, etc. It also includes public networks, private networks or the internet itself. To restrict the unauthorized access, change or distribution, different techniques are applied to secure the information. Cyber security is applied to make the data secure. Vulnerabilities: It is any weaknesses present in a system. A hacker can use the vulnerably to steal some data form a system, Following are some impotent types of • Backdoors: In a computer system, backdoor refers to a method of... 
 

The Basics of Cryptography

Cryptography is an emerging science that has gained popularity in the recent past. Cryptography is one of the two branches of Cryptology. The other branch of the Cryptology is Cryptanalysis. “Cryptology is the study of techniques for ensuring the secrecy and/or authenticity of information.” “Cryptography is the study of such techniques that ensure the secrecy and/or authenticity of information.” “Cryptanalysis deals with defeating such techniques to cover information, or forging information that will be accepted as authentic.” (William... 
 

Digital Signature and Authentication Protocols

Digital Signature is one of the most important developments from the work on public-key cryptography. Digital Signature implementation requires a specific set of security capabilities that would be difficult to implement in some other way. In this article we are going to discuss the basics of digital signature and Digital Signature Standard (DSS). Digital Signature: Digital Signature technique provides the freedom of secure and reliable communication. Digital Signature is implemented with the help of certain techniques and approaches that need to... 
 

The Basics of Electronic Mail Security

No one can deny the fact that emails service is one of the world’s largest services used on the internet. If we roughly estimate the number of email addresses in the world, we may cross 1 billion. There is no denying of the fact that email facility is one of the cheapest and reliable means of communication. It is due to that everyone uses email services around the world. But with the wide spread increase in the use of email service, some risks are also evolving over the period of time. It is important for all email users to know about the basics... 
 
© 2006-2017 Latest Technology News.