kunal-chowdhury.com

Security

Showing posts with label Security. Show all posts

The recent Cambridge Analytica scandal made people realize how much information about themselves they share online. For those of you unfamiliar with the scandal, a company used a Facebook quiz to profile its users, collecting information - mostly limited to what people chose to share on their public profiles but sometimes, the private messages of Facebook users, too. Let's learn three common sense tips to protect your privacy online.

Published by on under Privacy | Security

Phishing, Vishing and Smishing are tactics, attempts or strategies used to obtain sensitive information and details such as usernames, passwords, credit card details, bank details etc. often for malicious reasons and disguising as a legitimate source.

 

While their sole aim is to trick people into giving personal information or make payments, Phishing, Vishing and Smishing can be done in different ways. Let's discuss these in details.

Published by on under Phishing | Security

Starting with the release of Google Chrome version 68, in July 2018, it will mark the unencrypted sites as "Not Secure". That means, if you have a website that does not have SSL certificate, Google will start notifying the users that the site is not secure.

 

To provide a safer experience to your users, you must install SSL certificate and start serving your site in HTTPS protocol.

Published by on under Chrome | Google

In a month of two, after the attack of 'WannaCry', a new Ransomware named 'Petya' started spreading across the world. It's a massive cyber attack that paralyzed firms, airports, banks and government departments that uses unpatched old Windows operating system.

 

Starting with Ukraine, it already spread many countries like UK, Spain and India. Check this post to know how to take precaution from such attacks.

Published by on under Petya | Ransomware

You might have already heard about 'WannaCry' or 'WannaCrypt' ransomware which affected many outdated Windows system across the globe and demanded BitCoins worth $300 to decrypt the affected files. This was spread via a vulnerability on Windows system.

 

Though a fix was already given by Microsoft to safeguard the attack, but a tool to decrypt the affected PC has been recently published by security researchers.

Published by on under Ransomware | Security

In last few days, you might have heard about 'WannaCry' or 'WannaCrypt' ransomware which spread affected many systems across the globe. This was spread like a worm by using the Windows SMB vulnerability, which was patched in March.

 

You might become a victim, if you are not running Windows 10 and not yet patched your system with all the security updates that Microsoft released.

Published by on under Ransomware | Security

Windows provides a Wi-Fi security page, from where you can view the connected Wi-Fi connection’s password or network key. By default, the key remains hidden but you can view it anytime. There might be some reason when you want to retrieve or view the password.

 

Today in this blog post, we will learn how to retrieve it. For this to work, you must connected to that network at least once. Continue reading to know more.

Published by on under Security | Tips

Not every system has the right folder permission set to all user account and hence, sometime we need special access to specific folder during installation or while executing the application. It is not possible to manually set it up by browsing the folder and hence an automation is mandatory.

 

If you are looking for a way to set the right permission to specific folder(s) using C# code, this post will help you. Continue reading to learn more about it and grab the code.

Published by on under .Net | C#

Sometime we need to provide an encryption mechanism to protect user data in phone and/or sharing the data over internet to a database. Data security should be always maintain by a developer to protect the content of the application that the user enters.

 

If you are building an app and looking for some way to implement the mechanism, here is a wrapper class for you to do encryption and decryption of a string literal easily.

Published by on under Security | Silverlight

In the last post “What is Two-Factor Authentication?” we discussed about various factors of authentication system including different examples. We also learnt about Knowledge Factor, Inherence Factor and Possession Factor.

 

Microsoft recently added a second step authentication mechanism in all their accounts as an extra security layer. This post will guide you to turn ON/OFF this security layer.

Published by on under Security | Tips

Two-factor authentication is a user authentication system where an user needs to provide two different factors to authorize the user’s identity. It is not a new concept and in many places we are knowingly or unknowingly using it for secure access.

 

There could be multiple factors too and that known as Multi-factor authentication. Today in this post we will learn basics about this type of authentication system.

Published by on under Security | Tutorial

Today I received this “Security Alert” from Microsoft via email and thought to share this with you. If you are using ASP.Net in your server, read this post to know about it to keep your server in good health from this DoS Attack. Sharing the email as it is in this post.

 

Microsoft is aware of detailed information that has been published describing a new method to exploit hash tables. Attacks targeting this type of vulnerability are generically known as hash collision attacks. Attacks such as these are not specific to Microsoft technologies and affect other web service software providers. This vulnerability affects all versions of Microsoft .NET Framework and could allow for an unauthenticated denial of service attack on servers that serve ASP.NET pages.

Published by on under .Net | News

© 2008-2018 Kunal-Chowdhury.com | Designed by Kunal Chowdhury
Back to top