GoogleDrive, OneDrive, Dropbox can be hacked without user’s passwords
You may have heard of Man-in-the-Middle attacks, where a malicious actor makes a cyber attack by inserting himself between the sender and receiver, then gain access to their confidential and/or valuable data. Man-in-the-Middle attacks was a nightmare of many large corporations in the past few year. However, they now have something much more serious to worry about.
By Kavinda Keshan Rasnayake
Definition of myth:- A widely held but false belief or ideas.
Myths can occur in various places or situations, and can be related to many situations. Be it in engineering or arts, there can be various myths about various subjects. But when it comes to information security, clinging on to a myth can mean a spell of disaster.
UCSC wins 2nd, 3rd and 4th places at the annual Information Security Quiz organized by the Sri Lanka CERT|CC
The Information Security Quiz is an event organized by the Sri Lanka CERT|CC where enterprising students of universities and tertiary education institutes in Sri Lanka participate. This is organized in line with the Annual National Information Security Conference, held for the 7th consecutive year on the 10th of September 2014.
With the increase in the global uptake of information technology, decreased cost of implementing and running such technology as well as increased availability of facilities to a larger proportion of the world population; availability of timely and reliable information has increasingly moved from being a competitive advantage, to a basic necessity. This would particularly be the case for individuals and companies where the lack of an online presence
The Members day was held on the 7th of May 2014 at Prof. V.K Samaranayake Auditorium of The University of Colombo School of Computing. The guest speaker was Mr. Loshan Wickramasekara of TechCERT/ A division of LK Domain registry on Android V Security.
The openness of Android has enabled it to open doors to many developers allowing businesses to reach a large customer base as well as supporting many custom third party applications for a breadth of purposes. This has enabled Android to become one of world’s most popular mobile operating systems. However, this openness tends to increase security