Security
Security
Password protection is no longer being considered safe by advanced enterprises as they pose a very easy target for hackers. In this context what would be some other methods to increase security? What is the two factor authentication and why is it being considered as a safer alternative? Is it a holistic solution for security? |
- 468 views
- 1 answers
- 0 votes
The recent news about the Home Depot Breach has raised a very important question about the security and integrity of the Point Of Sale systems. Why is it that such large multi nationals have been falling prey to persistent hackers and have not been able to plug their security loop holes? |
- 465 views
- 1 answers
- 0 votes
Microsoft has announced that as a result of it stopping support to the Windows XP version in April, 2014, XP users can now be be exposed to a zero day forever risk. This threat will arise from reverse engineered security patches for its new versions. What does this mean and what is the solution for XP users? |
- 487 views
- 1 answers
- 0 votes
What is the Red October malware? The virus was reportedly used to transmit information from its victims ranging from diplomatic secrets to personal information for five years before it could be detected and eliminated. What was the reason that prevented the virus from being detected for so long? What was its mode of infection? |
- 519 views
- 1 answers
- 0 votes
Crime ware as a service (CaaS) is said to be the next big thing in the world of Web security. What is CaaS all about? How are the perpetrators of CaaS any different from the ordinary hacker? Why is the effect of CaaS expected to be more dangerous and farfetched than hacking? |
- 543 views
- 1 answers
- 0 votes
What are zero day attacks? Why is it known as zero day? What exactly is under threat from zero day attacks? What is an Expoit Wednesday ? What is the relevance of the term? What is the process which is currently in place to eliminate these kinds of attacks? What is zero day protection? |
- 519 views
- 1 answers
- 0 votes
How could and advanced persistent threat affect my network? What is the techniques used in these type of attacks? What does persistent imply here? Does this activity arise from human involvement or is it software at work here? How can I identify if my network is under attack and what can I do to stem such an attack?
- 589 views
- 1 answers
- 0 votes
The SoakSoak.ru website is known to contain and distribute a malware which has the capability to infect Wordpress by exposing a previously identified vulnerability.This has led to Google blacklisting hundreds of domains. What can do if I am targeted by this malware? What is the risk to my website from such an attack? |
- 470 views
- 1 answers
- 0 votes
What is a phishing kit? What are its contents? What is the use of such a kit and what is it used for? Who would possibly sell such kits and to whom? How would I know if I see a phishing kit? What could I do to protect myself from such attacks? |
- 587 views
- 1 answers
- 0 votes
The recent news of the Home depot systems being breached has been the latest with respect to attack on major retailers and in line with the attack on Target last year. As customers using credit cards at local stores for over the counter purchases what is the recourse available for us to protect our credit card data from being stolen? |
- 490 views
- 1 answers
- 0 votes