- 12 ways to become the most 'stupid' security guy

we propose this article to 'awaken' some people who are too disrespectful to the most basic security measures, those who 'doze off' on unreliable or offered tools on some unreliable ones. website.
- TrueCrypt encourages users to take other key measures

unfortunately for fans of popular encryption software, truecrypt on the program's official website has a red text warning that truecrypt is no longer safe to continue using. the text is highlighted in red immediately after opening the sourceforge homepage of truecrypt, explaining that due to unresolved security errors.
- How to scan websites for potential security vulnerabilities with Vega on Kali Linux

resisting a hacker attack is one of the most important responsibilities a system administrator must perform. therefore, it is important for a system administrator to take proactive measures to find and fix vulnerabilities in their websites.
- Experts from Kaspersky make recommendations on organizing secure online meetings

measures to avoid cyber security risks when working online during an epidemic season
- Simple ways to protect home security cameras, avoid hacking

in order to protect yourself and your family against security camera attacks, users can take the simple measures below.
- Trojan 2.0 - Implications of Web 2.0 technology

finjan malware research center has just released the fourth security risk report. accordingly, measures against traditional malware - signature-based (virus detection based on a database of known malware software) and
- Foreshadow - the fifth most serious security hole in the CPU in 2018

this vulnerability could bypass intel sgx security measures. what a tiring year for microprocessors, especially intel.
- How to configure a firewall to block the WannaCry ransomware attack

the infosec (information security) community has a lot of good security measures to protect against ransomware attacks, including ransomware firewall best practices, antivirus tools, and ransomware protection strategies. .
- Some common data security measures

data protection is extremely essential, because data is the most important asset of users on computers. it can be said that the need to use computers and networks comes from data.
- 4 reasons why Windows UAC is useless

if you have been using windows vista or windows 7, you will probably feel a lot of pain when you have to get the system approval every time you install an application. this feature is called user account control (uac), ...