Found 987 Articles for Safe & Security

Delete Your Chrome History Selectively

karthikeya Boyini
Updated on 20-Jan-2020 08:17:05

4K+ Views

From time to time, clearing browsing history on chrome is a good habit, many do it as this particular action of theirs, help protect their privacy and prevent everyone having access to their personal computer from collecting information about them by having a glance at their browsing history.Chrome browser offers the best erase tool which lets you delete your browsing logs from the beginning or day, week or month. However, if you wish to delete your history selectively or if you want to delete one particular site or few sites from Chrome memory.Chrome Browsing HistorySimilar to other web browsers, Google ... Read More

10 Ways to keep your Data safe in Cloud Environment

Sharon Christine
Updated on 20-Jan-2020 06:04:42

186 Views

A “cloud” in the technological sense, can be defined as a huge online place for storing and accessing data and program files in the internet, instead of your computer hardware- like local disk. When we talk about storing and accessing data, our first concern is how secure is our data, how much can we rely on the cloud environment. Cloud environment is as safe as data stored in an individual data server.Cloud is the latest trend in technology and most of us store all data in cloud housed in Dropbox, Google Drive. Generally, people assume that all the data stores ... Read More

Why did Facebook recently buy passwords off Black market?

karthikeya Boyini
Updated on 11-May-2022 12:43:15

237 Views

Facebook, a very popular social networking site, that helps you connect with people. Some of you are well acquainted with and some you don’t, still you get a chance to make new friends and we learn a lot of things, updates on latest movies’ gossip and the list goes on. So, our Facebook account is a pass key to know everything going around the world starting from our street, city, to country and world.Just like bank accounts we prefer to keep our Facebook account private, just to ourselves, like you can share your account number with someone but not your ... Read More

Security Testing – The Need of the Hour

Sharon Christine
Updated on 17-Jan-2020 12:39:21

123 Views

Yahoo! recently confirmed that a massive data breach occurred to their system in late 2014 and due to that at least 500 million users account information may have been hacked. The statement by Yahoo spokes-person states that the account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords and, in some cases, encrypted or unencrypted security questions and answers.Another news from the USA, the American security agencies recently found that hackers are trying hard to penetrate the voter registry database to get the confidential information, as the election is round the corner. Though they are ... Read More

The WhatsApp’s Two-step Verification

karthikeya Boyini
Updated on 27-Apr-2022 13:24:04

2K+ Views

If I ask you what are the basic necessities of life, you would answer food, clothing shelter with internet and a smartphone of course. No, we are not discussing about internet but a reason why we desperately want internet, yes that’s right, for WhatsApp. WhatsApp is a must have app these days for every smartphone owner.WhatsApp is the most popular and widely used messaging app. It is impossible to talk about WhatsApp and not include the privacy and security part in it. We use lots of measures to maintain our privacy, like pattern lock, password protection, archive the chats etc. ... Read More

Difference between Firewall and Anti-virus

Kiran Kumar Panigrahi
Updated on 23-Aug-2022 14:02:04

964 Views

Both Firewall and Antivirus are security tools that protect the computer systems as well as the network infrastructure from virus, worms, Trojans, and other such cyber-threats. Firewalls scan and evaluate the data packets before they enter into a network, and then they either allow or deny the data packets based on certain predefined rules setup by the network protocols. Firewalls can be implemented both at the software and hardware levels, while an antivirus program can be implemented only at the software level. Read through this article to know more about Firewall and Antivirus and how they are different from each ... Read More

Difference between Cyber Security and Information Security

Mahesh Parahar
Updated on 24-Feb-2020 12:06:11

955 Views

Cyber Security and Information Security both terms are synonymous with each other the difference between the two comes when nature of data which is going to secure. In nutshell Cyber security deals with protecting networks, computers, and data from unauthorized electronic access while Information security deals with protecting information assets regardless of whether the information is in physical or digital format.Data security is all about securing data. But there is difference between data and information. Not every data can be information. Data can be called as information when it is interpreted in a context and given meaning. For example, “14041989″ ... Read More

Difference between IPSec and SSL

Kiran Kumar Panigrahi
Updated on 05-Jan-2023 15:38:48

2K+ Views

IPSec is a suite of protocols that provides security services during communications between networks. It supports network-level peer authentication, data origin authentication, data integrity, data encryption and decryption. It is often used to create a VPN.SSL is a networking protocol that provides a secure connection between a client and a server over the internet. It works at the transport layer. It is often used to secure the communication between a web browser and a web server.Read through this article to find out more about IPSec and SSL and how they are different from each other.What is IP Security (IPSec)?IPSec is ... Read More

Ethical Hacking Career: Skills You Should Ace to Become Most Wanted Ethical Hacker

Swetha Prasanna
Updated on 29-Feb-2024 14:55:42

545 Views

Ethical hacking is one of such domains which is ever-challenging and is increasingly in demand year after year. Ethical hacking experts are in great demand across banking and finance, insurance, medical and research based businesses all across the world. Additionally, the growth of the internet and digital devices is adding to the demand for experts in cybersecurity. Organisations and businesses are offering more importance to securing their networks than ever before. This is thus an encouraging trend to enthusiasts who are keen to begin their career in cybersecurity and to take up challenges in securing a network. Why cybersecurity ... Read More

Difference between Active Attack and Passive Attack

Kiran Kumar Panigrahi
Updated on 20-Dec-2022 11:44:29

16K+ Views

Active and Passive Attacks are security attacks that jeopardize the security of a system. Security attacks are basically the unauthorized actions that that are taken to destroy, change, or steal the sensitive information and data from the system. In an Active attack, an attacker tries to modify the content of the messages. On the other hand, in a Passive attack, an attacker observes the messages, copy them and may use them for malicious purposes. Read this article to find out more about Active and Passive attacks and how they are different from each other. Let's start with some basics of ... Read More

Advertisements