Thursday , 2 July 2020
Home / IT Security / Security+ (page 5)

Security+

Smog – The Hackers Attacked on Karachi Education Board Website

Hackers Attacked Karachi Education Website

The hackers are again becoming diligent, and harmful for the education websites of Pakistan. Following is the news of hacking heard by the citizens of Pakistan about the Karachi education board website. The website is informative, and so important for the people of Karachi as it uploads different examination results, and all other necessary updates for the students. There is …

Read More »

‘NADRA’ Complete Guide of this Organization 2019 [Updated]

What Is Nadra? Nadra Stands for National Database and Registration Authority, an independent organization that comes under the Ministry of Interior, Govt of Pakistan. The main focus of this organization is to manage the Government Database and hold the record of all the national citizens of Pakistan. They statistically keep the data of citizens and put them under the secure …

Read More »

Sources for Information Gathering

Sources for Information Gathering

Many different sources exist for information gathering. The following list cannot possibly cover every source out there, but it does outline the major choices you have. Gathering Information from Websites Corporate and/or personal websites can provide a bounty of information. The first thing a good social engineer will often do is gather as much data as he can from the …

Read More »

EU Set to Legislate on Terror Content

EU Set to Legislate on Terror Content

The European Commission to force social networks to take down the terror content within an hour, in light of the apparent failure of self-regulation. Security commissioner, Julian King, told the FT on Sunday that he had “not seen enough progress” from the likes of Facebook, Google and Twitter on that issues guidelines that were tightened back in the March. “We …

Read More »

Historically High Q2 for Mobile Banking Trojan

The Historically High Q2 for Mobile Banking Trojan

Historically High Q2 for Mobile Banking Trojan: Mobile banking Trojan is ranked as the top security problem in the second quarter of 2018, which do includes the threats from a new cyber-espionage group, “Operation Parliament,” which is specially targeting the high profile companies of Middle East and North Africa, especially Palestine, according to researchers at Kaspersky Lab. Kaspersky Lab has …

Read More »

Dixons Carphone: Breach Hit 10 Million Personal Records

Dixons Carphone: Breach Hit 10 Million Personal Records

Dixons Carphone has revealed its estimation of how much the customer data was stolen in the recent disclosed breach by almost nine million records. The UK retailer has revealed in June that the attackers had accessed almost 1.2 million personal data of Currys PC World and Dixons Travel Store customers. Those hacked data includes names, addresses and email addresses. However, …

Read More »

Types of Biometric Controls

Types of Biometric Controls

There are a number of biometric controls that are used today; below we have the major implementations and their specific pros and cons with regards to access control security.   Fingerprints Fingerprints are the most widely used biometric control available today. Smartcards can carry fingerprint information. Many U.S government office buildings rely on fingerprint authentication for physical access to the …

Read More »

PERSONNEL SECURITY

PERSONNEL SECURITY

Users can pose the biggest security risk to an organization. Background checks should be performed, contractors who needs to be securely managed, and the users ought to be properly trained and made aware of the security risks, as we will discuss next. Security Awareness and Training Security awareness and training are often confused. Awareness changes user behavior, while training provides …

Read More »

YouTube Launches New Tool For Finding and Removing Unauthorized Re-Uploads

YouTube Launches New Tool For Finding and Removing Unauthorized Re-Uploads

Re-uploading videos on YouTube is a favorite scammy channel that gets profit from other people’s hard work. The Copyright owners have already many ways to protect their content, but Today, they are introducing a new tool that automatically scans every single new videos that are uploaded to check whether the re-upload of an existing one or “very similar” to a …

Read More »

THE OSI MODEL

THE OSI MODEL

The OSI (Open System Interconnection) reference model is a layered network model. The model is of course abstract; we do not directly run the OSI model in our systems (most now use the TCP/IP model). Rather, it is used as a reference point, so “Layer 1” (physical) is universally understood, whether you are running Ethernet or an ATM, for example. …

Read More »