Posts

Showing posts from December, 2017

What is the difference between cyber forensics and cyber security?

Image
Cyber forensics deals with analysing, preserving, extracting and submitting evidence in an permissible format. Cyberforensics extensively deals with investigation of cybercrimes and frauds that happen using technology. Cybersecurity is a vast field. It deals with finding vulnerbilities (loop holes). Patching those loopholes which might be present in websites, operating system, software etc and thereby imrpoving the entire security so that hacking attempts can be reduced. Hope this helps.

Why you should get your hands on a yubikey...!!

I have covered the importance of MFA (Multi-Factor Authentication) aka 2-factor security with more and more vendors such as Gmail, Outlook, and others now supporting MFA there is no reason not to have it enabled. MFA  is the answer to a lot of security issues when it comes to authentication. One of the common complaints with MFA is that it is not always user-friendly and can be hard to setup for the average user. Google has the authenticator app available on the play store and there are others such as  Authy  but for some reason still, users don’t embrace this security measure. worst of all its totally free! One vendor that is making this process easier for users while also streamlining the MFA support for everyone else is  YUBIKEY YUBIKEY uses a physical device that you can put on your keychain that has a button that you press on it. While the others use mobile apps and use the phone as the physical device that is used for the secon...

Are iPhones safe from virus attacks??

Image
In June 2012, Mikko Hypponen, an anti-virus veteran, shared an exciting tweet which said — “iPhone is 5 years old today. After 5 years, not a single serious malware case. It’s not just luck; we need to congratulate Apple on this.” It is a matter of time. During the past couple months, things have changed considerably. Most of us may not agree to this in the present day. Let’s look at  Why! Global Ransomware Outbreak In the last two months, with the outbreak of the global cyber-attack crippling Windows-based systems, every user be it for Windows or Mac are now left wondering how secure they are in reality?                WannaCry and Petya: Their Impact The reason being, these severe vulnerabilities—WannaCry,                  Up till date, these are considered as the worst ransomware attack for Windows users. Though these ransomware does not affect the Mac system yet, it does n...

Privacy and its Flaws...!!

Image
“Privacy”  is a interesting, and very commonly misunderstood, concept in IT. Lots of security flaws online can have its origins on this misunderstanding, hence the relevance of clearly all this. This topic is relevant for both security and programming perspectives. Privacy for humans is, (most of the time) simple. When we tell someone “this is private”, the person understands “do not show to anybody” , but privacy is a human concept, not a machine concept. Privacy for machines means the same but is applied differently. When we indicate “this is private”, the machine understands  “do not show to other humans” . This is why is important to test the privacy settings when putting something online: just because something says “private”, doesn’t mean it actually is… How can this misconception originate flaws? When a website is designed, the designer makes a “privacy setup” menu and adds the option to make something private. He/She can also request ...

Cyber security..!!!

Image
WHAT IS CYBER SECURITY? Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction. WHY IS CYBER SECURITY IMPORTANT? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great deal of confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber attacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security. During a Senate hearing in March 2013, the nation's top intelligence officials warned that cyber attacks and digital spying are the top threat to national security, eclipsing terrorism.

What is Networking???

Image
Well! In IT (Computer) terms : Networking is connecting two or more devices so that they can share their information and resources. And we use devices like  Routers  to connect network,  Switches  to create networks,  Firewall  to protect network,  IP-Phones  to make calls over network,  VPN  to create secure tunnel in network. Regards Tajwar khan

Know the importance of CLOUD Computing in IT Sector.

Image
Cloud computing is a global reality today . Cloud Computing Being in the clouds has become the destination for existence in the Internet world. The traditional way of IT environment involves the buying of servers, hardware, licenses, installation of software, and so forth. The process is costly, involves infrastructure demands and long deployment cycles. This kind of IT Internet model is getting replaced by evolving technologies and cloud computing is bringing the major shift in the IT industry tremendously at a faster rate. It is indeed a utility based and service oriented model. The businesses of all sizes and varied industry verticals are deploying cloud solutions across the globe. The vendors today are offering e-mail apps, security options, production systems, storage, backup services, and other IT components in the cloud. “The new private cloud options, public cloud, and SaaS innovations will power the Enterprise transformation in 2018. In, 2018 it is predicted th...

Here are the most commonly used Passwords of 2017.

Image
When a website forces you to use numbers, symbols, and a certain amount of characters in your password, it can be frustrating, but those strength requirements are there for a reason. Without them, many users will enter a password that’s easy to remember and, by extension, is easy for hackers to guess. There are several ways to keep your online identity secure, but before you do anything else, make sure you’re not using any passwords from the list below. SplashData compiled this data by analyzing millions of accounts—mostly from users in western Europe and North America—that were compromised in the past year, Gizmodo reports. To show how the most popular passwords of 2017 compare to 2016's, they've indicated whether each entry has kept its old slot, gone up or down in the rankings, or is new to the list. The latest round-up includes some predictable entries: “123456” occupies the same number one slot it held last year, followed by “password” at number two. There...

How does one create a strong password?

Image
The best way to create secure and memorable password is to create a string of unrelated words, the string should be large more than 11 characters. Because smaller length of random character can be easily broken than larger length of unrelated words. Ex.  onceuponatimetherewasacrow  is much more stronger than **TajWar@123@## because using symbols, numbers and capital letters can make password more secure. but advanced software can search these symbols so what matters more is length of word than randomness of characters. so this strategy of using lengthy unrelated words will give you strong, longer and complex passphrase that is easy to remember.      And also you can check how much your password is secure or not?  click here    I hope it helps!

Is there any difference between hacking and ethical hacking? If so, What does these mean?

Image
There is nothing much difference between Ethical Hacking and Hacking. In the context of computer security, Hacking means exploiting weakness in the computer system or network or  software, and the person who’s involved in this activity is called a hacker. Generally there are almost 6 - 7 types of  Hackers. A. Black Hat Hackers - These guys are also known as Crackers, who cracks the system for malicious purposes or personal gain and can make destructive cyber attacks. B. Grey Hat Hackers - These Hackers are a Combo of Ethical Hackers and Crackers, they can even find flaws and report it to the company and for personal purposes they can leave backdoor malware to make access of it. C. White Hat Hackers - These guys are called as Ethical Hackers, where these kind of hackers are appointed in Firms or Security Agencies to patch up the flaws. D. Scriptkiddies - These guys are unskilled hackers, who even don’t know about the expertise knowledge in computers i.e. Co...