Article on the subject of "security"
-
Apple updates XProtect to block 'Windows' malware on a Mac
apple's xprotect security software has recently been quietly updated to add some signature to help detect windows pe files as well as windows executable files that can be run on mac using mono .net framework.
-
Young people are too confident when talking about online security!
when talking to many young people who are in daily contact with technology even more with relatives or friends, many of them tell me that humanity is really living at the height of public technology and information security. is this thought correct?
-
Fileless malware - Achilles heel of traditional antivirus software
by the definition of being unified and widely recognized by many industry-leading security experts, the malware fileless is the type of malicious code that does not write malicious executable files to the file system.
-
Endpoint Detection and Response threats, an emerging security technology
endpoint threat detection and response (etdr) is a term first introduced by security expert anton chuvakin from gartner in 2013 to refer to the tools mainly focus on detecting and investigating suspicious activities (as well as traces of other phenomena that don't always happen) on the server or
-
The alarming increase in the number of attacks targeted at IoT devices
along with the explosive growth of globalized internet and especially wireless connectivity, the number of attacks targeted internet devices and things (iot) has escalated 'scary. 'throughout 2018.
-
Insider attacks are becoming more and more popular and difficult to detect
internal attacks are becoming more and more popular in recent years.
-
Reveal personal data of more than 1.3 million people from a vulnerability in web application
georgia tech (georgia institute of technology) - one of the largest us education institutions, has announced the discovery of a serious data breach targeting its system, affecting nearly 1.3 million people.
-
If using an Android phone, be careful: You may be being tracked without knowing
android - google's mobile operating system has behaviors that silently monitor users that make them unaware. more seriously, it can also access a user's personal data store through a large number of pre-installed applications that are virtually difficult to uninstall.
-
Ransomware LockerGoga is making a big corporation miserable
norsk hydro - one of the world's largest aluminum and renewable energy corporations based in oslo, norway, was forced to suspend most of its production lines and switch to manual operation. part of a network attack is said to be related to lockergoga malicious code.
-
What is cybercrime? How to prevent cybercrime?
we live in an era of internet globalization. the internet invades every corner of the street, is present in every living room and appears in every breath of life. in addition to the obvious benefits, as well as the enormous positive role in the overall development of all humanity, the global
-
Azorult Trojan steals user passwords while running in the background like Google Update
azorult trojan is a malware released to steal user information on a large scale.
-
New USB cable type allows hackers to perform remote attacks
when plugging in a linux, mac, or windows computer, this usb cable will be recognized by the operating system as hid or a normal user interface device ...
-
New phishing attacks appear to use Google Translate as a disguise
recently, a phishing campaign to steal google accounts and facebook login information has been discovered using google translate (google translate) as a disguised location on mobile browsers.
-
What can organizations do to protect themselves from cyber attacks?
the devastation, the losses of billions of dollars are caused by cyber attacks that are increasingly expanding around the world in terms of scale, manner and extent of danger.
-
Hackers use banks as a starting point for phishing attacks
the cybercrime attacks banks and financial institutions entering and using a compromised infrastructure to have access to specific goals in every region or country that is trending. increase.
-
Install the patch immediately for Windows Server & Windows 10 to run IIS so that it will not be attacked by DOS
windows server and windows 10 servers running internet information services (iis) easily become targets of denial of service (dos) attacks.
-
The Internet is experiencing a huge problem with C / C ++, causing developers to 'sweat'
an error affects the iphone, another error affecting windows and the third bug affects servers running linux - the total attack of a certain 'dark army'?
-
VNCERT issued an emergency alert warning malicious code exploiting Coinhive virtual money
the malicious code will automatically run on the user's computer as an extension or directly in the browser to 'dig' bitcoin virtual money, monero ..., illegally use cpu, hard drive, memory ... and send it about hackers' electronic wallets.
-
AI-based systems are designed to detect poachers
hunters often hunt at night, which is why infrared cameras mounted on unmanned aircraft are used to detect them. the problem is, because both poachers and animals emit heat, it is difficult to accurately identify.
-
SD-WAN security options
let's look at sd-wan security and partnerships with suppliers, including aruba, cisco, riverbed and silver peak.
-
Symposium on IBM Security and Security 2011
on april 21, 2011, ibm held at the ibm 2011 security security symposium in hanoi. during the conference, ibm mentioned ways to integrate security and security features ...
-
How to create security questions nobody can guess
a problem that is very much concerned about is how to restore online accounts. a typical security option is to set up a security question. this has the ability to recover your account quickly and easily, but also requires a security responsibility from the user.
-
What you need to know about an information security analyst
due to the increase in network attacks and database breaches, companies are becoming more and more cautious about their data security issues.
-
Learn about terminal security (endpoint security)
the world of modern information technology brings many benefits but also favorable conditions for bad guys to make use of.
-
Awareness and experience - the most important factor in every network security process
need to improve information security capacity in 3 basic elements: people, processes, and technology solutions
-
IBM developed a new technology to patch security holes
top security researchers at ibm have recently developed a new technique to etch almost entirely the impact of security vulnerabilities before they are actually found.
-
The basic steps in dealing with network security issues that you need to understand
with the general situation of network security, which is becoming more and more complicated, today, the system security is becoming more urgent than ever.
-
Top 5 trends in endpoint security for 2018
endpoint security is a type of security that is growing rapidly.
-
7 mistakes make Internet security at risk
every week, we see an increase in the number of online data theft cases. being hacked is a permanent threat. but we can still easily protect ourselves from these attacks by modifying some bad habits.
-
9 misconceptions about security and how to resolve
almost every recent study of security vulnerabilities has come to the same conclusion: people are more risky factors for a business than technology gaps.
-
Security for smartphones - how to be absolutely secure?
accompanied by an explosion of support-specific gadgets, there are gaps, shortcomings and vigilance from users.
-
4 web browsers pay great attention to security
everyone is concerned about the security of their information and privacy in the digital world, especially in an era when the internet is booming and becoming an inevitable part of life and security issues. personal data security is becoming increasingly urgent as today.
-
4 security warnings you should not 'ignore'
when you are performing activities on the internet and suddenly a warning is issued from your web browser or operating system, you should take care of it and it is important to act in a timely manner.
-
SECURITY SECURITY II: Security Policy Account for Computer Security Account Policies
in the previous section i introduced common methods to protect an organization's computer. in the next part, i will present the specific methods in order, from the process of setting up the system, operating the system based on the safety policies from basic to the advance skills that the admin
-
Learn about information security engineers
information security engineer is the one who builds and maintains it security solutions for an organization. in this intermediate position, you will develop security for your company's systems / projects and handle any technical issues that arise.
-
Things to know about an information system security manager
today, due to the actual demand, large it security departments will often need a person to manage the information system security manager.
-
7 Cisco security tips
cisco has just released its first annual security report with the launch of cisco security center website (cisco.com/security). the report also makes predictions about security threats in 2008 along with advice from security experts.
-
Review Kaspersky Internet Security 2021: A comprehensive set of security tools for computers
kaspersky internet security 2021 is a premium single-license multi-utility security suite that protects against malware, phishing, and ensures safe browsing. this multi-layered security software keeps your important data safe on the internet.
-
What is Crowdsourced Security?
before a new software product is released to the market, it is checked for vulnerabilities. every responsible company performs these tests to protect both customers and the company itself from cyber threats.