Blog Posts - Information Security



كيف تحرق الفيروسات القطع المادية للكمبيوتر + تعليقي بخصوص هجمات DDOS الأخيرة

أتحداك أن تستطيع حل هذه الألغاز كاملة بشكل صحيح

Dropbox is requiring users who have not changed their passwords since mid-2012 to reset

The action appears to be related to continued fallout over the massive hack on LinkedIn in 2012 where credentials for 117 million accounts were posted online. In recent months, treasure troves of user credentials and passwords — in addition to a la...
by BMT on Aug 26, 2016

Over 1.4 Billion Android Devices are Affected by Internet Traffic Hijacking Linux Flaw

An estimated 80 percent of Android smartphones and tablets running Android 4.4 KitKat and higher are vulnerable to a recently disclosed Linux kernel flaw that allows hackers to terminate connections, spy on unencrypted traffic or inject malware into...
by blogmytuts on Aug 19, 2016

SwiftKey third-party keyboard's cloud sync service leaked user email addresses as text predictions

The new SwiftKey glitch turned out to be sort of alarming. For the last week, some SwiftKey users have been offered predictive text for slang they've never used before, words in other foreign languages and, most concerning, email addresses and phone...
by BMT on Jul 30, 2016

Security Jobs: Cybersecurity Engineering and Architecture Manager, Chicago, IL

Jeff Snyder is the President of Securityrecruiter.com, an executive retained search firm highly specialized in information security, corporate security, physical security, electronic security and converged security recruiting.

22 خطوة لتأمين وحماية هاتفك ضد الإختراق والسرقة والفيروسات

Security Jobs: Cybersecurity Operations Manager, Chicago, IL

For this role, you'll have a background in Security Operations, Networks, Penetration Testing, Security Engineering and related technologies.You'll manage a group of technically skilled engineers in a company that will depend on you to keep it's cybe...

Security Jobs: Cybersecruity Leadership, CISO, Chicago, IL

I'm working on writing up multiple job descriptions.  This role in Chicago is one of them. Local candidates are preferred.  This role exists in a highly structured, hierarchical environment.  This role will likely be called Chief...

Mark Zuckerberg Covers His Laptop Camera and Mic Jack

On Tuesday, observers were reminded that Mr. Zuckerberg, 32, is not just a normal guy who enjoys running and quiet dinners with friends. In a photo posted to his Facebook account, he celebrated the growing user base of Instagram, which is owned by Fa...
by BMT on Jun 23, 2016

Hack Facebook Account Just by Knowing their Phone Numbers Using SS7

Pare marunong kaba mag hack ng Facebook? The question that always ask..Researchers have just proven by taking control of a Facebook account with only the target's phone number and some hacking skills.Hackers with skills to exploit the SS7 network can...
by BMT on Jun 18, 2016

How to check if your one of the Million Account Leaked floating around the Internet

Everyone freaks out over millions of Twitter accounts passwords floating around. The hackers when they see account details floating around in the recent LinkedIn data breach, from which they took his SHA1-hashed password string and then broke it a...
by BMT on Jun 13, 2016

Information Security policy and its Importance

In the present time security of information should maintain properly in order to keep it safe from unauthorized persons. For the proper use of information an  Information security policy design by the organization.Information Security PolicyInfo...
by Computer Science Junction on Jun 7, 2016

نسبة خصوصيتك هي صفر | توضيح الحلقة السابقة

خطورة الإنترنت ومسألة الخصوصية تحديداً هي أحد المسائل المعقدة والمهمة في مجال العالم الإفتراضي. في حلقة الأسبوع الماضي كنت قد تطرقت فيها...

لا توجد خصوصية على الإنترنت - شاهد واحكم بنفسك (تحدي)

10 نصائح ذهبية ومهمة لحمايتك على الإنترنت

إنتبهوا لأطفالكم - خطورة مواقع التواصل الإجتماعي على البنات الصغيرة

إستكمالاً لسلسة التوعية الأمنية التي أحاول من خلالها تبسيط مواضيع متعلقة بأمن المعلومات وتقديمها للمستخدم العادي الذي ليس لديه خبرة كاف...

سوف أخدعك في هذا الفيديو وأنت لا تعلم

IT2042 Information Security April May 2016 Important Questions

Important Questions for Anna University Chennai April May 2016 B.E / B.Tech Degree Examinations Department of B.E-Computer Science and Engineering Eighth Semester IT2042 Information Security April May 2016 Important Questions (Regulation 2008) Attac...
by University Question Papers on Apr 21, 2016

تحذير للبنات : بالدليل خطورة نشر الصور الشخصية على الشبكات الإجتماعية



Trending Topics

Close