Posts

Showing posts from May, 2021

QR Codes: A Sneaky Security Threat

Image
  What is a QR Code?   A QR Code, or Quick Response Code, is a Code that is quickly readable by a cell phone (hence the word “quick” in the name). Using a combination of spacing as a type of Matrix Barcode (a 2-D Barcode), when a QR Code is scanned, it conveys a wide multitude of information. QR Codes have a wide range of uses across all types of industries such as retail, marketing, and logistics. If it seems like QR codes have popped up everywhere these days, you’re right. Ever since they were first used by the Japanese auto industry to streamline manufacturing processes, companies everywhere have capitalized on the benefits of QR codes. They’re cheap to deploy and can be applied to almost anything — which is why every industry from retail to healthcare is now using them as a quick and easy way to link people to websites, promotional campaigns, store discounts, patient medical records, mobile payments and a whole lot more. QR codes aren’t just cost-effective and simple to u

What is Site Isolation in Web Brower's? How it Works.

Image
   What is Site Isolation in Web  Brower's ? Site Isolation is a security feature that offers additional protection against some types of security bugs.  It makes it harder for untrustworthy websites to access or steal information from your accounts on other websites.   Websites typically cannot access each other's data inside the browser, thanks to code that enforces the Same Origin Policy.  Occasionally, security bugs are found in this code and malicious websites may try to bypass these rules to attack other websites.    Site Isolation offers a second line of defence to make such attacks less likely to succeed.  It ensures that pages from different websites are always put into different processes, each running in a sandbox that limits what the process is allowed to do.  It also makes it possible to block the process from receiving certain types of sensitive data from other sites.  As a result, a malicious website will find it much more difficult to steal data from other sites

What is a Rootkit Malware?

Image
What is a Rootkit Malware?                       Computer viruses and other malware are real threats. And rootkits might be the most dangerous, both in the damage they can cause and the difficulty you might have in finding and removing them. Rootkits are a type of malware that are designed so that they can remain hidden on your computer. But while you might not notice them, they are active. Rootkits give cybercriminals the ability to remotely control your computer. Rootkits can contain a number of tools, ranging from programs that allow hackers to steal your passwords to modules that make it easy for them to steal your credit card or online banking information. Rootkits can also give hackers the ability to subvert or disable security software and track the keys you tap on your keyword, making it easy for criminals to steal your personal information. Because rootkits can hijack or subvert security software, they are especially hard to detect, making it likely that this type of malware c

What is Cyber Attacks ? Types OF Cyber-Attacks

Image
A cyber attack is an attempt to disable computers, steal data, or use a breached computer system to launch additional attacks. Cybercriminals can use a variety of methods to launch a cyber attack including malware, phishing, ransomware, man-in-the-middle attack, and other methods.  In other situations, cyber attacks can be part of nation-states' cyber warfare or cyber terrorism efforts.  Strong organizational-wide cybersecurity and network security controls are now more important than ever. A cybercriminal may steal, alter, or destroy a specified target by hacking into a susceptible system. Cyber threats can range in sophistication from installing malicious software like malware or a ransomware attack (such as WannaCry) on a small business to attempting to take down critical infrastructure like a local government or government agency like the FBI or Department of Homeland Security. One common by product of a cyber attack is a data breach, where personal data or other sensitive inf