Computer Architecture, Hardware domain of the CISSP Exam
This article provides a review of the Computer Architecture, Hardware domain of the CISSP (Certified Information Systems Security Professional) exam. More ...
Keep Your Firefox Browsing Private
As you browse the web, Firefox saves a lot of information about your activities: phrases you've typed into search engines, sites you've visited, files you've downloaded, and more. There may be times, however, when you don't want other users of your computer to view this information. More ...
What is Riskware or Grayware?
Riskware are computer programs that possess features that have the potential to be dangerous. Riskware is usually classified based on its function or behavior. The following are the common types of riskware: Spyware, Adware, Hacker tools, Joke. More ...
An Introduction to Forensics Data Acquisition From Android Mobile Devices
Copying a hard-drive from a desktop or laptop computer is trivial as compared to the data extraction methods needed for mobile devices. This article explains some forensic methods for mobile devices. More ...
Fundamentals of Windows Security
Today, criminals are more sophisticated, and groups have formed with significant financial backing to support the wrong doings of these groups. This information is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. More ...
Smart Card
Some smart cards contain an embedded microprocessor which can be programed with applications. Some smart cards have electrical contacts, the microprocessor is under a gold contact pad on one side of the card. Many cards are contactless and use radio-frequency to operate. More ...
What is Phishing and How to Safeguard Against It
Every time you open an email you may be subject to a phishing attack. Upon opening a phishing email, which you will believe came from an authentic source such as your bank or eBay or Paypal, you will be directed to a website to enter your personal information. More ...
Encryption, Designed to Protect Data, is Internet Criminal's Best Tool
Encryption was designed to protect the data. Pirates now use this tool to not only encrypt your data and but also charge you to unencrypt it. They don't even have to take possession of anything. More ...
No Software on the Market Removes All Spyware
Spyware is software that, once it's on your system, starts spying on you in various ways. Once installed on your computer spyware will record what you do and send all the information it gathers back to a marketing company. More ...
How to Stay Safe on Public Wi-Fi
More mobile phone users are using public Wi-Fi hotspots. Data sent through public Wi-Fi can easily be intercepted, many mobile device and laptop users are risking the security of their personal information, digital identity and money. More ...
Botnets - What Are They?
A botnet is malicious software that takes over a computer and turns it into a zombie and makes it join a network of other zombie computers under the control of hackers for the purpose of performing a denial of service (DOS) attack on a website. More ...
PC Chassis Intrusion Detection
An unauthorized person might open a PC case to temporarily remove a hard drive to copy its contents, or to reset the system's password. Newer desktop PCs have a sensor located inside their case that detects when the case cover is removed and sends a signal to the BIOS. More ...
BIOS Security
There are several features available in modern BIOS that can be configured to help prevent malicious attacks on a PC. These include Boot Sector Virus Protection, BIOS Password, and BIOS Boot Sequence. More ...