Data Security: Service and Tool

services, tools, resources, and stories: it's an imformation hub of data security to help keep your data secure.

Custom Search
 Search Services
Key Words
Country/Area
City



 Search Tools
Hot Words
Key Words
Category
OS/Device



 Hot StoriesMore ... 

SPECTRE AND MELTDOWN EXPLAINED: WHAT THEY ARE AND HOW THEY WORK

By Josh Fruhlinger
As you may have heard in the news, there are 3 significant flaws on all computer systems running modern hardware called Meltdown and Spectre, the latter actually means 2 flaws. If exploited, these flaws can expose sensitive information on your computer (e.g. passwords, encryption keys, company documents). The risks are in nearly every computer chip manufactured in the last 20 years. Is there a design to tolerate fundamental security flaws for higher performance? ...
By Josh Fruhlinger  View Source  
Related stories:   CPU   FLAW   MELTDOWN   
Confessions of Former Hacker: 5 Techniques to Make More Secure Online
We spend money and time on privacy secret in this or that way, but do we know how the hackers think about? The guy, who was on the US government’s “Most Wanted” list and finally served 5 years in prison for hacking mobile phones, recently gave some suggestions to to safeguard personal information online: The first one is to use a password manager. Is is a good idea, especially which is from a hacker? At least, I dislike password manager because it hints hackers what is the gateway of my privacy...
By Jeanie Ahn  View Source  
Hackers Spying on Sonos and Bose Smart Systems
Anything attached to internet, it will be potential object of hackers. The warnings about toys isn't passed completely, the home speakers are reported to have a number of security gaps that could give anyone access to the device from a remote location. Some famous brands, like Sonos and Bose, are in the warning list. As a matter of fact, the internet connected devices give the physical accessing of hackers, it opens a crack, small or big, to cause home security issues...
By CHEYENNE MACDONALD  View Source  
Is your toy spying on you? Find out how to hack the hackers
In holiday season, toys are the commonest presents of boys and girls. More and more smart toys run in bedroom, living room, or bathroom, which are bringing new privacy issues or threats. FBI once raised warnings on toys, e.g. Grinch-like, which said toys connected to the Internet could be a target of hackers to listen in on conversations or to steal information related household. Read the paper and an eye on kid's toys...
By AP New York  View Source  
Chinese Hacker Groups To Shift Focus To India In 2018
Hackers aren't identical to criminals, although common people usually feel the risks from them and even leak data or lose money. Some hacker groups are actually backed by nation-states, called as APTs (Advanced Persistent Threat). It's one reason why cyber security situation is worse and malware is more. The recent reports disclosed Chinese APT groups are shifting focus in 2018 to India and other south Asia counties as a part of Beijing's global market goal. It's time to check if your data center is safe...
By Indo-Asian News  View Source