Data encryption has proven to be an effective source of protecting sensitive data from being stolen or manipulated by unauthorized entities. According to latest report released by WinMagic Data Security (n.d.), there are certain myths and misconceptions that are found in peoples’ minds. (McNickle, 2012) Let’s debunk them! [Read more…]
Internet of Things are an integral part of our lives without which, it is unimaginable to exist in this era of technological progression. Everything we use these days is some way or another, connected to Internet. So it comes as no surprise that changes in the net neutrality has direct impact on Internet of Things. Here in this article, we are going to discuss the influence end of net neutrality will have on Internet of Things, if and when it happens. [Read more…]
Cryptocurrency – it came, it saw, it conquered; and now it is facing a foreign invasion. Its defences were breached by hackers who managed to get away with 153,000 ethers, which are $32 million in current exchange rate. Parity Technologies faced this security hack in their multi-signature wallet software while normal wallets are safe as yet. Before this, CoinDash had to cancel their ICO after facing a $10 million hack. (Wilmoth, 2017) [Read more…]
Cloud technology is the need of the hour and most sought after tool to secure ones’ data after the security breaches being reported by reputed online companies such as Yahoo. In 2013, Yahoo reported hack in its system and over 500 million users’ accounts were affected, this is huge number to say the least. (Eugenio, 2017) This glitch in Yahoo’s decision making as not to make security of data its top priority has cost the company and its users significant loses. This should come as a fair warning to all the users and companies whose data is floating on the Internet. [Read more…]
What is SSL?
As website owners and IT professionals, I am sure you are well aware of SSL. But just in case, God forbidding you don’t, here’s a brief intro. SSL i.e., Secure Sockets Layer is a security mechanism that is devised to secure the transmission of data between the website and the end user. More specifically, the aim of Secure Sockets Layer is to secure the personal information of users such as your credit card numbers, social security numbers and your login details which are prone to attacks from hackers. [Read more…]
Ever since the bulk of communication and correspondence has become automated, cases of breaches and identity thefts have become a commonplace phenomenon. It has cost the end users their credibility, investor loyalty, and reputation. Cybercrime is a reality which the governments around the world have decided to kerb through the implementation of regular laws. The European Union has taken one such step in the form of Data Protection Regulation, or the European Encryption Directive. [Read more…]