Hey guys… Are you familiar with the CIA? Let me clear you about this abbreviation. It does not stand for ‘Central Intelligence Agency’. It stands for “Confidentiality, Integrity, and Availability”. To eliminate this confusion, it is often referred to as “AIC” i.e. Availability, Integrity, and Confidentiality. These are the 3 pillars of security. The AIC triad is a model that is designed especially for companies to form security policies. The 3 major elements of this triad are considerably crucial for security purposes. Let us go deep into these elements:- Availability- Well, it refers to the accessibility of information in a…
Continue Readingnovalis
Large-scale v/s small-scale & Cybersecurity
Cybercriminals are gaining ground by each passing day. Neither small-scale nor large-scale companies are protected from so-called cyber criminals. In earlier days i.e. in the 1980s and 1990s, computer security systems were mainly to fight against small-scale risks. Users normally protect their devices by installing anti-virus software, non-complex passwords, packet filtering rules, and malware scanners. In those days, there were simple threats and that’s why it was not necessary to have high-security systems. However, if we talk about today’s scenario, then these simple techniques are not enough to protect the systems and privacy. With the advancement in technology, large-scale infrastructure…
Continue ReadingDo you know that person in the “Black Hat”?
Today I was searching for news related to security. And guess what I found? A black hat hacker! What is it? My first thought upon seeing this is- a hacker in a black hat. But what it turns out to be is-“a criminal who finds computer security vulnerabilities and misuse them for earning money or other malicious reasons”. All bank statements and financial information can get stolen by the black hat hackers, thereby; can damage the reputation of small and large organizations. Who can become black hat hackers? Black hat hackers could be anyone from teenage amateurs who have knowledge…
Continue ReadingGolang stealer malware # New in the market
A new cryptocurrency crook has found its new way of writing i.e. Golang (Go) programming language which is famous among cybercriminals writing malware in Go. Let me tell you a little about Go. It is a programming language designed in 2007 at Google. The main motive behind its designing is to improve programming productivity. It was designed by Robert Griesemer, Rob Pike, and Ken Thompson. Sofacy produced a new variant of Zebrocy malware last year which was written in Go to create a functionally similar to Trojan to use in spear-phishing emails with an LNK shortcut attachment. Researchers represented the…
Continue ReadingTips for security awareness training programs
We know enough about cyber threats. Today, let’s get straight into the various security training programs. The ideal program should include exercises such as: Clean Desk Policy Your desk where you work must be clean when not in use. Things such as sticky notes, printouts, papers, and credentials, sensitive and confidential data must be placed in the locked drawers to keep them safe from thieves and criminals. Managing data There are a lot of backup data of customers and employees which they are not aware of. The importance of this data is often neglected by the employees. If such kind…
Continue ReadingMobile Operating Systems And Their Security
In older days, cybercriminals were mainly targeting laptops and computers. However, with the advent of the latest technology, smart phones have also become their target. If we look into the security purposes, then which one is the most secured- Android or IOS. Let’s have a look at both the operating system and find which is secure enough for your safety purpose. Android operating system:- Androids are hugely popular among individuals. There are several apps created for the ease of people which they install in their android phones, but the problem arises when attackers build an app with a motive of…
Continue ReadingEverything to know about VPN
Are you worried about your security and privacy while surfing via unsecured Wi-Fi network? Then, VPN is the answer to protect you from such privacy issues. VPN stands for ‘Virtual Private Network’. It protects you by hiding your internet protocol address so that you can’t get traced. VPN can provide security more than secured Wi-Fi by making encrypted connections. All your online activities like shopping, payments, sending emails, etc are protected by VPN. VPN can hide many things which can keep your privacy at risk. The things which a VPN can hide are: Browsing history- Whatever you search over the…
Continue ReadingFaceApp- The increasing popularity along with privacy concerns
I am pretty sure that all are aware of FaceApp. It is a blissful experience to see one’s old age face with this app. From celebrities to common people, all are obsessed with this digital age face app. This is a Russian app. People are happily posting their digitally aged pictures on Instagram, Whatsapp, and other social media. But, what this FaceApp cost to them? It’s their privacy. People do not know the fact that this popular app utilizes the privacy of its users. You might have noticed that upon downloading this app on mobile phones, you’re asked to agree…
Continue Reading4G versus Wi-Fi
To stay connected in this technological world, we use various internet access methods like 3G, 4G, or Wi-Fi. We become excited about getting free public Wi-Fi. However, the question arises as how much these hotspots are safe and how much are we secure. Let’s first understand these technologies:- Public Wi-Fi hotspots: These hotspots can be found in places such as malls, airports, shops, restaurants, hotels, etc. Unfortunately, this free accessibility to the internet is the least secure way as it may involve malware or threat that may steal your identity or may insert a virus to your mobile phones or…
Continue ReadingSecure your system with hardware and software cleaning – Part 2
In part 1, we discussed the cleaning procedure of hardware which is the prior need of securing your system from external factors. Today, we’re gonna shed light on the software part. This is an important step if you wish to increase the longevity of your system. Back up your data: Backing-up the crucial information or pictures is the effective method to save your data as you never know when malware can hit your system and you may lose all your credentials. Either, store the data in external drives or save it on the cloud. Install anti-virus: Anti-virus acts as a…
Continue Reading