Home » Cyber Security

The Basics of Encryption

There is no denying the fact that encryption is one of the most important and technical subject of study. Encryption of data that is to be transmitted to others over internet is always subjected to some encryption technique. The email services like, Gmail, Yahoo and Hotmail all have some sort of encryption method to apply over each and every email. Encryption is one of the most important topics of Cryptography. History: Encryption is not new to this world. It is thousands years old. Researchers have found the evidences of presence of encryption... 
 

Are Firewalls Still Relevant?

“The function of a strong position is to make the forces holding it practically unassailable.” On War, Carl Von Clausewitz “On the day that you take up your commands, block the frontier passes, destroy the official tallies, and stop the passage of all emissaries.” The Art of War, Sun Tzu Introduction: Historically, erecting a firewall refers to erecting a great barrier to prevent someone from entering in to a premises. Firewalls are very important means of protecting local system or network of systems from network based security threats.... 
 

Good Computing Practices

There are plenty of threats on the internet. There are numerous criminal minds around the globe trying to harm all of us using hacking techniques. It is necessary to be prepared to coup with potential attack on your computer. All computer and internet users must adopt some basic precautionary measures to keep themselves safe on the internet. This article presents some basic elements to consider to make the defense of computer strong against any potential attach. Choosing a Strong Password Choosing a strong password is so much important. One must... 
 

The Basics About Hacking

A computer hacker is person who is not authorized to access a certain facility but it accesses that facility. A hacker first check and study the system and gather some vulnerabilities in the system. Most of the time, hackers try to harm others via the internet. Sometimes hacking techniques are used to History: The history of hacking dates back to 1960s to Yippie, a counterculture movement that published Classification: By the passage of time, hacking field is getting deeper and deeper. There are many types of hackers. It is now a broad field that... 
 

8 Pro Tips to Protect From Hackers

Ledgers discharged, credit demolished, character stolen and lives flipped around – without a culprit steadily strolling in your entryway. Any individual who goes online can be hacked. I am going to share top advices of three specialists for counsel on what you can do to make your corner of the Web more secure: Magdy Attia, senior member of the School of STEM at Charlotte’s Johnson C. Smith College. Redvers Davies, originator of Hackerspace Charlotte, an open-innovation lab. Will Enck, partner educator of software engineering at N.C. State;... 
 

Best Antivirus for Windows

The significance of antivirus software products cannot be over emphasized for protection from potential threats, which include all sorts of malwares, spywares, worms, rootkits, infected files and USB, you name it. Traditionally anti-virus software packages were only able to stop known viruses and malwares. Nevertheless, antivirus technology is changed that not only prevent from known threats but unknown too, thus making new packages better equipped to provide protection. The internet users are being bombarded with new antivirus products each year. ... 
 

IP Security

“If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death, together with the man to whom the secret was told.” The Art of War, Sun Tzu Introduction: Due increased threats of attacks of hackers on the internet, experts have developed application specific security mechanisms. Like for the security of electronic mail (S/MIME and PGP), client-server (Kerberos), Web access (Secure Socket Layer), etc. for security reasons, organizations need to block some URLs or links. So for blocking specific links, IP level... 
 

Malicious Software

“What is the concept of defense: The parrying of a blow. What is its characteristic future: Awaiting the blow.” On War, Carl Von Clausewitz Introduction: Malicious software of malware is a type of computer program which aims at exploiting the vulnerabilities in a computer. So it is important to know how a program can harm out computer. We should also need to know what are different types of a malicious program and in what ways these programs can harm our computer. So in the later part of the article we would focus on different types of malicious... 
 

Scams and How to Prevent Yourself

New and new types of internet based scams are coming to knowledge in the recent years. It is necessary for all internet users that they at least try to know about the basic of the patterns used by scammers to deceive them. So in this article we are going to discuss in what ways scammers can deceive us and how we can prevent to fall victim to the scammers. Beware of Scams:                   People are getting to know about the prospective scams but with each day the hackers and criminals are coming up with newer strategies to deceive... 
 

Free Antivirus Software Products

Every machine we use such as PC, smart phone, tablet and laptop connected to internet is vulnerable. Security companies also know that, therefore, there are dozens of paid products claiming to offer protection from all sorts of online, and offline potential threats including malwares, Trojans and worms. But paying annual subscription fees and covering all devices can be expensive. If that is what you believe in too, you have come to right place. Keep on reading! Nevertheless, many free antivirus solutions available are not exactly samebut nearly... 
 
© 2006-2017 Latest Technology News.