Found 1010 Articles for Safe & Security

How Ethical Hacking is Helping IT Security?

Sharon Christine
Updated on 24-Jan-2020 08:15:14

99 Views

While hackers have been causing a lot of pains to enterprises, another community of hackers have also been finding out vulnerabilities in the IT systems, albeit with a different objective. Such hackers, known as ethical hackers, proactively identify IT system vulnerabilities by hacking into the systems. Ethical hackers are a boon to enterprises because they identify potential vulnerabilities without any malicious intent. Enterprises can fix the issues before hackers can exploit them. Ethical hackers are being increasingly recognized – reputed organizations have been paying bounties to ethical hackers to find security loopholes in their systems that are hitherto undetected.Who is ... Read More

Fireball – The Virus Which Can Hijack Your Browser

Sharon Christine
Updated on 24-Jan-2020 07:30:46

297 Views

Beware of all the internet surfers; the Fireball virus is coming to compromise your security!! Your internet browser is at high risk, as the browser attacking nasty virus can take control of your browser and do whatever it want without your consent. It can even run malicious codes, download files and much more on your own machine without your knowledge.After the dangerous WannaCry Ransomware attack which gave sleepless nights to millions of people worldwide, now another dirty virus called as “Fireball” is on attacking spree to make its victims around the world. As per the latest reports, the Fireball malware ... Read More

Features that Matter in an Effective Mobile Anti-Virus!!

Sharon Christine
Updated on 24-Jan-2020 07:26:54

106 Views

The usage of the smartphone has witnessed exponential growth in recent times. The benefit of using a smart device coupled with an active internet connection is endless. However, with multiple advantages, there is a possibility of unwanted suspicious threats. These threats are regarding the fall of your sensitive data which is present inside a mobile which may go into wrong hands through malware or spyware.Though most mobile users think antivirus as the only savior from a disaster, they lack the knowledge of judging the best one among all available. It takes a lot of parameters to decide the exact worthiness ... Read More

Face Detection and Recognition Systems

Sharon Christine
Updated on 24-Jan-2020 07:19:10

377 Views

Imagine standing in front of the entrance door to your office and see your face flash up on a large screen. If the screen identifies you, it opens the doors; if it doesn’t the doors don’t open. Your face is your digital ID. It allows you to enter your office and authenticate your identity in a hoard of other places. Sounds uncanny, but is undeniably remarkable! This not so old technology is on its way to becoming ubiquitous.Enter the world of face detection and recognition systems…recognizing the face from all angles, with even more accuracy than a person can. Using ... Read More

WannaCry Ransomware – How to Avoid Such Attacks

karthikeya Boyini
Updated on 23-Jan-2020 11:40:33

82 Views

The recent WannaCry ransomware attack is so massive that it has affected more than 2, 00, 000 machines across 150 countries around the globe. There are individuals, various institutions and government agencies who became victims of this cyber extortion. Now all of them are desperately looking for a solution to retrieve their locked data. They may not want to pay the demanded ransom amount, but if they will not able to find a suitable solution then, may end up paying the ransom to the blackmailers.While paying the ransom amount, there is no guaranty that whether you will get back your ... Read More

Top Free Anti – Virus Softwares

karthikeya Boyini
Updated on 23-Jan-2020 11:23:25

126 Views

Looking at the safety concerns of your Organization, an anti-virus software is a basic requirement in today’s technology-savvy world. Every now and then, we keep on getting new viruses launched in the market. This, in turn, requires a basic anti-virus software being installed on your PCs.If you are a start-up or a small scale technology firm, it is difficult to invest in a good and costly anti-virus software. Worry Not. We have some great anti-virus software available in the market for free or we can say at a very less price. These products are free only for non-commercial use; if ... Read More

‘Ransomware Locky’ a new threat decoded and How to Protect Yourself

karthikeya Boyini
Updated on 23-Jan-2020 09:50:58

78 Views

A Government Organization CERT (Computer Emergency Response Team) has issued a high priority alert that a new ransomware Locky has spread like ransomware WannaCry which has compromised a huge number of the computer system in the India, which has also affected ATM network and Government offices computers too.The CERT issued a severe threat alert on Saturday and also advised to the users not to open any unknown emails from an unknown sender as it is estimated that an approx. of 23 million emails, messages are sent in the phishing campaign.The studies estimate more than 100 countries in the world have ... Read More

Ransomware Attack – The Modern Ways of Cyber Extortion

karthikeya Boyini
Updated on 23-Jan-2020 09:49:04

72 Views

The recent ransomware attack has changed the definition of centuries-old style of demanding ransom. Typically what we know earlier that, the bad guys kidnapped a person or an item and held captive to extort money or property to secure their release. That is the typical way of demanding ransom which we sometimes found in our national and international newspapers as well as in many Hollywood and Bollywood movies where similar stories are kept on playing.But, most of us may not ever thought of those files and folders on your desktops, laptops, and smartphones which can be locked and hold for ... Read More

How To Configure and Set Up a Firewall on Ubuntu 16.04

Sharon Christine
Updated on 23-Jan-2020 07:47:45

1K+ Views

In this article we will learn about – how to configure and setup UFW ( Firewall) on Ubuntu 16.04, UFW stands for Uncomplicated Firewall which acts as an interface to IPTABLES that simplifies the process of the configuration of firewalls it will be a very hard for a beginners to learns and configure the firewall rules where we will secure the network from unknown users are machines. UFW works on the policies we configure as rules.Pre-requisitesFor this, we needed a non-root user with root permission on the machine.Installing the UFW (Firewall)UFW is installed by default with Ubuntu, if not installed ... Read More

Learn How to Manage System Firewall using Iptables in Linux

karthikeya Boyini
Updated on 23-Jan-2020 05:50:52

285 Views

Iptables and ip6tables are used to established, maintain, and check up on the tables of IPv4 and IPv6 packet filter ideas in the Linux kernel. Several distinct tables may be defined. Each table contains a quantity of constructed-in chains and may also contain person-outlined chains. Let us explore about how to manage a system firewall using Iptables in Linux.Installing IP tablesTo install IP tables, use the following command –$sudo apt-get install iptablesThe sample output should be like this –Reading package lists... Done Building dependency tree Reading state information... Done The following packages were automatically installed and are no longer required: ... Read More

Advertisements