Misc Security

Misc Security

Which of these security strategies: Biometric, certificates, non text passwords and signatures would best keep confidential and sensitive information safe? With increasing security breaches, threats and sophistication on the part of the attackers, which among these four (Biometric, certificates, non text passwords and signatures) should be used for organization protection?

  • 818 views
  • 2 answers
  • 0 votes

Can phone home access restriction be used without internet connection? I tried to use phone home to restrict user in some system app without internet connectivity. The idea is to prevent any user without internet access from using most of the functionality of the app. I have tried some approach but the result is not what I desire. Is the idea feasible? What other approach can I use to achieve this idea?

  • 587 views
  • 1 answers
  • 0 votes

How secure is Apple pay and Google wallet? With many merchants and stores accepting Apple pay and Google wallet, what should I be concerned with about using either of the two for payment? Can unauthorized transaction be performed with the two without the one using Google wallet or Apple pay knowing? How long are the data collected by the merchant stored on their server?

  • 545 views
  • 1 answers
  • 0 votes

How secure is multifactor password authentication? With the recent J P Morgan chase penetration, no matter how long a password it, it won’t protect you. Also personal privacy is at all-time low. What algorithm does the multifactor password authentication uses? What differentiates multifactor password authentication from the traditional password form?

  • 516 views
  • 1 answers
  • 0 votes

What is the best, easy to use, economical protection strategy against ‘Stingray’ surveillance system? How can someone know if Stingray or any controversial surveillance system is collecting personal and sensitive record on a cell phone or any other radio devices? What distinctive features should one look out for in an area that one suspect of some clandestine surveillance activity is going on?

  • 600 views
  • 1 answers
  • 0 votes

What are the vulnerabilities of cloud computing? By the way individual and large corporations  are seriously embracing cloud computing and virtualization, which is more susceptible to attacks, how do we guide against the attacks or threats? What are the latest cloud computing security breakthroughs that is giving hackers a sleepless night?

  • 463 views
  • 1 answers
  • 0 votes

What is the best approach to Near Field Communication (NFC)? With many devices, tablets, smart phone, etc. now equipped with near field communication, how secure are the data collected by these NFC enabled devices? What are the data collected? Where are these data stored? How secure are the data where they are stored?

  • 564 views
  • 1 answers
  • 0 votes

What are the differences between one time password (OTP) and security tokens? Is it true that some tokens work as hardware OTP? Which of the two implements a cryptographic challenge response authentication? Can an attacker remotely made an unauthorized transaction while someone is using OTP? are the two part of multilevel authentication?

  • 534 views
  • 1 answers
  • 0 votes

Recently I have been experiencing the problem of someone accessing my Facebook account again and again. I have the mobile code feature on in which you have to enter code from your mobile so the person is not able to open my account. But I have to keep on changing the password and it is very annoying. What can I do to stop this? Does Facebook have any additional security features?

  • 621 views
  • 2 answers
  • 0 votes
Several disaster striking virus like the Shamoon , Flame etc have targeted the energy sector and have caused crippling consequences. What could be a risk management strategy for such critical industries to ensure that there is better defense strategy in place in case of future attacks? Can we eliminate zero day attacks such as the ones above?

 

  • 584 views
  • 1 answers
  • 0 votes

Latest Articles

How To Choose The Right Linux VPS For Your Needs

Choosing the right Linux virtual private server (VPS) is a critical decision that can greatly impact your online projects, whether you’re running a website, hosting applications, or setting up a development environment. With various...

Benefits Of Storing And Sharing Documents In The Cloud

Have you ever wished you could access your important documents anytime, anywhere? With cloud document storage, that wish becomes a reality. In today’s fast-paced world, secure and accessible document management is more essential than...

From Lost To Found: Restore Your Data On Windows 11

Are you worried about data you lost during some operation on your Windows 11? Don’t worry; we are here to guide you on how to recover the lost data from your Windows device in...

Latest Blogs

Top 10 New Laptop Entrants That Shook The Public

The finest laptops are powerful enough to do your daily tasks, comfortable enough to use all day, and power-efficient enough to ensure you don't run out of battery power unexpectedly. Of course, all these...

10 Facts About The Dark Web

Before getting into knowing the facts, let’s have a brief about the Dark Web. The dark web is the data of the World Wide Web that is accessible only through special software, combinations, or...

Top 10 Latest Steam Cleaner Machines

While looking for a chemical-free way to clear and purify both durable and low grounds in your home, a steam cleaner is an excellent solution. With a spurt of superheated steam, this cleaning equipment...

Latest Tips

Top 10 Internet Monitoring Software

Internet monitoring software keeps a log of all internet activities. You can install this type of software on your computer remotely or by the administrator. An operating console controls this software. This type of...

Top 10 Best Partition Manager Software

A Hard Disk Drive is usually partitioned into various smaller drives for optimization. A partition manager helps make this process easier and more efficient. Here, let’s discuss the top 10 best partition manager software. 1....

Top 10 Best Online Music Production Software

Music production is the initial stage of any song. Music production can be done either in studios or at home using an online music production software. Here, let’s discuss the top 10 best online...