Do you choose to incorporate the cookie policy as a section of the privacy policy? Let’s discuss What is a Cookie?  A cookie is a short text file that some Web sites place on your PC, usually, so you can use the site more conveniently.  If you return to the website later, your Web browser sends the small file to the server to notify the website of any previous activity you engaged in on the site. Once you return to a website, the server can retrieve the cookie file from the local computer to assist in expediting certain functions such as logging in and retrieving account or user data. Name, Value, and expiration time of Cookies are 3 important things. Expiration time means how long it lasts. In earlier days Cookies were saved as a file in the C drive. It saves the client access, site preferences, language, technical support,…

Read more

Among the different biometric modalities like fingerprint, finger vein, palm vein, facial, etc. retinal scan is one of the most reliable ones because everyone has a unique retinal pattern that can’t be counterfeited. A retinal security scan has proven its capability in implementing reliable biometric security protocols in various high-risk sectors like border patrol and aviation. Retinal scan authentication is a complex mathematical pattern. It is a technique that identifies the unique eye patterns of an individual. How this System works This scanning methodology is delicate to set up, and I simply explain the criteria.  Retinal scanning is based on the fine capillary network that provides oxygen and nutrients to the retina. It works by casting an unperceived beam of low-energy infrared light into an individual’s eye as they place it close to the scanner. The beam of light travels in a straight path and hits your retina gently. The…

Read more

Ready to go with 5G? What is this G all about? The “G” stands for Generation. We know when we connect to the internet from our phone next to the signal bar on our home screen, it shows a range of E, G, 2G, 3G, etc. This indicates the strength of the connection we have. Each Generation is defined as a set of telephone network standards, which is a particular mobile phone system. With technology changes, the speed of the network increases, and that is why we have several generations. All these are based on LTE technology. Features 1G 2G 3G 4G 5G Started developing 1970 1980 1990 2000 2010 Bandwidth (Peak Rate) 2kbps ~ 64 kbps 2Mbps ~ 1Gbps ~ 20Gbps The aim of wireless communication is to provide high quality as wired communication (Optical Fibers). The 1G was introduced to the general public in 1979, and now it has gone until 5G. All…

Read more

Introduction You are probably familiar with browser extensions, which most of us use on a daily basis. They add a lot of useful features to browsers, but at the same time, they post threats to both privacy and security. Let’s see what’s wrong with the browser extensions and how to minimize the privacy problems. What are browser extensions and why do we need them? A browser extension is a small software application that adds capacity or functionality to a web browser. A browser extension, also called a plug-in, can take advantage of the same application program interfaces (APIs) that JavaScript can on a web page, but the extension can do more because it also has access to its own set of APIs. For example, extensions are used to block ads on Web pages, translate text from one language to another, or add pages to a third-party bookmark service such as…

Read more

Endpoint Security Endpoint security or endpoint protection is an approach to the protection of computer networks that are remotely bridged to client devices. The connection of laptops, tablets, mobile phones and other wireless devices to corporate networks creates attack paths for security threats.  Endpoint security systems protect these endpoints on a network or in the cloud from cybersecurity threats. Endpoint security has evolved from traditional antivirus software to providing comprehensive protection from sophisticated malware and evolving zero-day threats. Importance of Endpoint security First of all, in today’s business world, data is often the most valuable asset a company has—and to lose that data, or lose access to that data, could put the entire business at risk of insolvency. Businesses have also had to contend with not only a growing number of endpoints, but also a rise in the number of types of endpoints. Insecure endpoints can act as an open…

Read more

Introduction to Intrusion Prevention Systems (IPS) An Intrusion Prevention System is a network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits usually come in the form of malicious inputs to a target application or service that attackers use to interrupt and gain control of an application or machine. Following a successful exploit, the attacker can disable the target application, or can potentially access to all the rights and permissions available to the compromised application. IPS and IDS – What is the difference? When looking into IPS solutions, you may also come across Intrusion Detection Systems (IDS). Before we look into how intrusion prevention systems work, lets take a look at the difference between IPS and IDS. What is an IDS? An Intrusion Detection system is a system that monitors network traffic for suspicious activity and alerts when such activity is discovered. Some IDSs are…

Read more

Mobile devices and you  As people tend to use their mobile devices more frequently in their day to day life, mobile device security has become increasingly important in mobile computing. Of particular concern is the security of personal and business information now stored on smartphones. More and more users and businesses use smartphones to communicate, but also to plan and organize their users’ work and also private life. Within companies, these technologies are causing profound changes in the organization of information systems and therefore they have become the source of new risks. Indeed, smartphones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the company. All smartphones, as computers, are preferred targets of attacks. These attacks exploit weaknesses inherent in smartphones that can come from the communication mode-like Short Message Service (SMS,…

Read more

Today, security automation involves substituting manual processes with automated systems to facilitate the detection and prevention of cyber-threats  Let’s Discuss………. Cybersecurity automation is about  Making data collection faster and more efficient, bringing artificial intelligence and machine learning technologies and processes into the fold to increase organizations’ analytic capabilities. Security automation is the machine-based execution of security actions with the power to programmatically detect, investigate and remediate cyberthreats with or without human intervention by identifying incoming threats, triaging and prioritizing alerts as they emerge, then responding to them in a timely fashion. Cyber security companies are teaching Artificial Intelligence systems to detect viruses and malware by using complex algorithms. So Artificial Intelligence can then run pattern recognition in software. Artificial Intelligence systems can also be used in situations of multi-factor authentication to provide access to their users. Today, cyber-security automation is regarded as a way of “making the playing ground level”…

Read more

In the day to day world, we all are using social media platforms as a main part of our lives. It has unknowingly become a habit of checking all the notifications in social media once we get a few minutes break out of our work. It is estimated that these social platform users spend nearly 2hours and 24 minutes per day on their social media. These platforms make us feel that we are more connected with each other than ever before. And far beyond that, these platforms are there to keep in touch with every move we do there, and provide us with better suggestions. The main purpose of being on social media is to build up connections with people and keep in touch with the people we are already connected with. So everyone should expect higher privacy within the social platforms because it contains very sensitive data of the…

Read more

Introduction The war between data defenders and data thieves has been described as a cat-and-mouse game. As soon as the white hats counter one from of black-hat malicious behavior, another malevolent form rears its ugly head. How can the playing field be titled in favor of the infosec warriors? Here are some most popular technologies which will enable us to do that. Hardware authentication The inadequacies of usernames and passwords are well known. Clearly, a more secure form of authentication is needed. One method is to bake authentication into a user’s hardware. Intel has built on previous efforts to dedicate a portion of the chipset for security functions to make a device part of the authentication process. Good authentication requires three things from users: what they know, such as a password; who they are, such as a username; and what they have, such as a token. In the case of Authenticate,…

Read more

10/57