Skip to main content

Posts

Showing posts with the label security

How to protect your email from being hacked and from being spammed.

Here are some simple dos and don'ts that will keep your email accounts secured from hackers. First and foremost implement two step verification processes for all emails like Gmail, Yahoo! and Outlook. This will help you protect your account even if the password is compromised. Also while using an enterprise email service - use PGP to encrypt emails which may contain confidential information.  Never post your email account address on social networking websites like Facebook and Twitter or make them public for everyone. Organized cyber criminal use software that harvest email addresses which are further sold to spammers online. Instead of posting your email account on forms and websites as-it-is. You should avoid using the "@" and ".". So instead of writing my email as smit@hacker.com, I write it as smit[at]ha cker.com This is because hackers run automated scripts to gather information about particular domains which copies and text with the "@...

IoT’s Biggest Challenges : Privacy and Security

E verything today from your mobile to refrigerators to cars are interconnected, which made our life easier. This device collectively called IoT. But they have also created new vulnerabilities for hackers. IoT devices are poised to pervasive in our lives than mobile phones and they have access to sensitive personal data may be your credit card number, banking information and many more. As number of IoT devices constantly increase, security risk also increases. Device manufacture’s doesn't care much regarding device security and consumer have to suffer may he can be hacked and there may be severe consequences. A single security concerns on single device can cause multiple concerns when considering multiple IoT devices interconnected together. IoT devices use some form of cloud service and a mobile application use to access and control device remotely. So it’s very important to understand security risk. Current Scenario : Security Risks Privacy Concerns Many devices co...