Search Results for: computer security
-
Black Hat
The Computer Security Act of 1987
The Computer Security Act requires federal agencies to identify and protect computer systems that contain sensitive information. This law requires…
Read More » -
Security News
Copy of Chinese Spy Chip Used in Security Training
The following reports from the Chinese spies infiltrated the supply chain of the servers which are assembled by the Supermicro…
Read More » -
Security News
43% of Security Pros Could Execute Insider Attack
43% of Security Pros Could Execute Insider Attack: A recent survey took place of nearly 200 IT professionals about insider…
Read More » -
Security+
Application Security
The Application Security: There are a number of issues to be cognizant of when it comes to application security. Many…
Read More » -
Security News
How To Scan Your Computer For Malware With Google Chrome
Scan Your Computer For Malware: The last 9 years till now, Google Chrome has become the best and the most…
Read More » -
Mobile
Goals of Mobile Security
Mobile Security: Mobile operating system comes in four flavors: Blackberry, Windows Mobile, Google Android, and Apple iOS. Of these, the…
Read More » -
Web Hacking
Firewall Configuration in Network Security
Firewall Configuration: Not all firewalls or firewall setups are created equally, so you need to be familiar with each setup…
Read More » -
Black Hat
Georgia Government Computer Servers Targeted With Ransomware Attack
Ransomware Attack on Georgia Government Computer: A cyber attack has been occurred within the Dawson Country Georgia which is targeting…
Read More » -
Security+
Complying with Privacy and Security Regulations
Complying with Privacy and Security Regulations: An organization’s security management policies don’t exist in a vacuum. Regulatory and governmental agencies…
Read More »