Misc Security

Misc Security

Which of these security strategies: Biometric, certificates, non text passwords and signatures would best keep confidential and sensitive information safe? With increasing security breaches, threats and sophistication on the part of the attackers, which among these four (Biometric, certificates, non text passwords and signatures) should be used for organization protection?

  • 823 views
  • 2 answers
  • 0 votes

Can phone home access restriction be used without internet connection? I tried to use phone home to restrict user in some system app without internet connectivity. The idea is to prevent any user without internet access from using most of the functionality of the app. I have tried some approach but the result is not what I desire. Is the idea feasible? What other approach can I use to achieve this idea?

  • 588 views
  • 1 answers
  • 0 votes

How secure is Apple pay and Google wallet? With many merchants and stores accepting Apple pay and Google wallet, what should I be concerned with about using either of the two for payment? Can unauthorized transaction be performed with the two without the one using Google wallet or Apple pay knowing? How long are the data collected by the merchant stored on their server?

  • 549 views
  • 1 answers
  • 0 votes

How secure is multifactor password authentication? With the recent J P Morgan chase penetration, no matter how long a password it, it won’t protect you. Also personal privacy is at all-time low. What algorithm does the multifactor password authentication uses? What differentiates multifactor password authentication from the traditional password form?

  • 518 views
  • 1 answers
  • 0 votes

What is the best, easy to use, economical protection strategy against ‘Stingray’ surveillance system? How can someone know if Stingray or any controversial surveillance system is collecting personal and sensitive record on a cell phone or any other radio devices? What distinctive features should one look out for in an area that one suspect of some clandestine surveillance activity is going on?

  • 601 views
  • 1 answers
  • 0 votes

What are the vulnerabilities of cloud computing? By the way individual and large corporations  are seriously embracing cloud computing and virtualization, which is more susceptible to attacks, how do we guide against the attacks or threats? What are the latest cloud computing security breakthroughs that is giving hackers a sleepless night?

  • 463 views
  • 1 answers
  • 0 votes

What is the best approach to Near Field Communication (NFC)? With many devices, tablets, smart phone, etc. now equipped with near field communication, how secure are the data collected by these NFC enabled devices? What are the data collected? Where are these data stored? How secure are the data where they are stored?

  • 568 views
  • 1 answers
  • 0 votes

What are the differences between one time password (OTP) and security tokens? Is it true that some tokens work as hardware OTP? Which of the two implements a cryptographic challenge response authentication? Can an attacker remotely made an unauthorized transaction while someone is using OTP? are the two part of multilevel authentication?

  • 536 views
  • 1 answers
  • 0 votes

Recently I have been experiencing the problem of someone accessing my Facebook account again and again. I have the mobile code feature on in which you have to enter code from your mobile so the person is not able to open my account. But I have to keep on changing the password and it is very annoying. What can I do to stop this? Does Facebook have any additional security features?

  • 624 views
  • 2 answers
  • 0 votes
Several disaster striking virus like the Shamoon , Flame etc have targeted the energy sector and have caused crippling consequences. What could be a risk management strategy for such critical industries to ensure that there is better defense strategy in place in case of future attacks? Can we eliminate zero day attacks such as the ones above?

 

  • 585 views
  • 1 answers
  • 0 votes

Latest Articles

Rokid Max 2 Review: I Tried AR Glasses So I Could Watch Netflix in...

I’m not a tech geek. I don’t keep up with every new gadget launch. I fly a few times a year, watch many movies on my phone, and live in a small apartment where...

Top 10 Technology Trends For 2025

With 2025 just around the corner, it is time to start thinking about what tech trends will be coming our way. Tech moves at a rapid pace. Some things may pop up next year...

How To Choose The Right Linux VPS For Your Needs

Choosing the right Linux virtual private server (VPS) is a critical decision that can greatly impact your online projects, whether you’re running a website, hosting applications, or setting up a development environment. With various...

Latest Blogs

Top 10 New Laptop Entrants That Shook The Public

The finest laptops are powerful enough to do your daily tasks, comfortable enough to use all day, and power-efficient enough to ensure you don't run out of battery power unexpectedly. Of course, all these...

10 Facts About The Dark Web

Before getting into knowing the facts, let’s have a brief about the Dark Web. The dark web is the data of the World Wide Web that is accessible only through special software, combinations, or...

Top 10 Latest Steam Cleaner Machines

While looking for a chemical-free way to clear and purify both durable and low grounds in your home, a steam cleaner is an excellent solution. With a spurt of superheated steam, this cleaning equipment...

Latest Tips

Top 10 Internet Monitoring Software

Internet monitoring software keeps a log of all internet activities. You can install this type of software on your computer remotely or by the administrator. An operating console controls this software. This type of...

Top 10 Best Partition Manager Software

A Hard Disk Drive is usually partitioned into various smaller drives for optimization. A partition manager helps make this process easier and more efficient. Here, let’s discuss the top 10 best partition manager software. 1....

Top 10 Best Online Music Production Software

Music production is the initial stage of any song. Music production can be done either in studios or at home using an online music production software. Here, let’s discuss the top 10 best online...