Latest Posts with security tag

security

319 Articles 2 Followers


My Comments on Information Security Policy when I was a young student

28 Jan 2021 3 minute read 0 comments 0fajarpurnama0

The information security policies that were explained on this lecture are policies when handling vulnerabilities. I strongly agree to this policy due to my past experience in modifying systems. Most of the time I broke the system and the best way aft...

Cautious Optimism and Grave Concerns as Intel Integrates Cybereason into Chips

27 Jan 2021 1 minute read 3 comments Matthew Rosenquist

Intel and Cybereason just announced that they are working to integrate Cybereason to collect data from hardware to software levels, with the goal of protecting users from ransomware. This is an opportunity for better cybersecurity, but also could be...

Why you should store your crypto on multiple wallets.

26 Jan 2021 2 minute read 7 comments EasilyRich.com

Why you should store your crypto on multiple wallets.   Some of you might be storing all your crypto on a single wallet address. Some people might say it is more convenient to store all your crypto on one address but they are taking a big risk when d...

The wild wild crypto west and its scammers

23 Jan 2021 3 minute read 0 comments R0bin

There is a lot of Wild West and fraud in the world of cryptocurrencies. Telegram users in particular can tell you a thing or two about it. It is enough to be a participant in a few Telegram groups of crypto exchanges or some - quite legitimate and se...

Biggest myths about safe passwords.

22 Jan 2021 4 minute read 0 comments Maciej Ficek

  During last years, people have became more aware about security issues.I believe that there is no person who reads as good site as Medium and uses passwors 123456. However, for hackers, password “ahjurw” or “YPFCXV” is not harder than “12345...

Finding the Next SolarWinds Type of Supply Chain Attack

20 Jan 2021 1 minute read 0 comments Matthew Rosenquist

The SolarWinds compromise showed that supply-chain attacks are possible and the ramifications can be tremendously impactful. Other nation states will be investing in efforts to duplicate this success. That makes IT tools, security products, hardware...

Telegram feature exposes your precise address to hackers and Signal's encryption allegedly cracked. (+Some personal commentaries for discussion and food for thought.)

20 Jan 2021 6 minute read 2 comments rhyzom

Original link from Ars Technica: If you’re using an Android device—or in some cases an iPhone—the Telegram messenger app makes it easy for hackers to find your precise location when you enable a feature that allows users who are geographically close...

How Crypto Wallets Keep Your Assets Safe

19 Jan 2021 2 minute read 0 comments O3 Labs

  With Bitcoin and other cryptocurrencies becoming popular, crypto security has been more important ever. No matter you are senior investors or new beginners in cryptocurrency, we all want to benefit from the features of it, which allows us to transa...

[Social Media Monopoly]- What is going on?- TAKE NOTE

15 Jan 2021 3 minute read 0 comments PickCoin

Hello everyone! 2021 has started in a quite peculiar way for certain microworlds such as cryptocurrencies and other businesses. But, what is happening with social networks? No one can deny that through the years, Mark Zuckerberg's business ideas ha...

FireFox Relay - does it work and is it safe?

13 Jan 2021 1 minute read 5 comments TipOfaTongue

  What is FireFox Relay?   Fire Fox Relay is a simple add-on based service that will enable you to easily create aliases for your e-mail account for all types of sites.  This way you will not have to create additional e-mail accounts and still can be...