Security

Showing posts with label Security. Show all posts

Mozilla launches its free Password Manager for Android, named "Firefox Lockbox". Without any extra set-up, it provides you easy access to the passwords that you have already stored in your Firefox browser.

 

With a 256-bit encryption, it stores your password in a secure vault. Based on your device capability, you can use Face ID or Fingerprint to unlock the app.

Published by on under Firefox | Mozilla

In today's world, safe guarding your online accounts from hijackers is a crucial part of life. In the past we have seen many data breaches where millions of users personal data like username/password were compromised.

 

On the event of Safer Internet Day on 5th February, Google announces a new extension "Password Checkup" for Chrome users to warn user if the entered credential is in Google's unsafe database.

Published by on under Chrome | Google

Microsoft is now moving towards implementing a completely secure, password-less login experience to Windows 10, which is expected to release publicly to all Windows 10 users with next feature update in April 2019.

 

Before the public release, you might be curious to know how to use a password-less account to signin to Windows 10. Let's learn how to configure it.

Published by on under Security | Windows

Windows Defender Application Guard is designed for Windows 10 and Microsoft Edge to isolate enterprise-defined untrusted sites to help you protect your system from malicious attacks. Using this hardware isolation approach, you can destroy the loophole that attackers use.

 

Where security is key concern, you should enable the Windows Defender Application Guard on your Windows 10 system and safely browse the internet using Microsoft Edge browser.

Published by on under Microsoft Edge | Security

If you are using Windows 10 October 2018 Update (version 1809), Microsoft Edge now supports password less authentication to sign-in to MSA accounts using WebAuthn and FIDO2 specifications. This makes Microsoft the first company to support password free authentication.

 

Let's discuss about password-less authentication and how to configure your Microsoft account to sign-in using Windows Hello and/or Security Keys.

Published by on under Microsoft Edge | News

Mady Marinescu, from the Windows Defender Engineering team, in an official blog post announced that the Windows Defender Antivirus can now run in a sandbox to provide you extra security layer. With this development, its the first Antivirus solution which can run in a sandbox.

 

To know more about this capability and to learn how to enable this feature in Windows 10, continue reading this post.

Published by on under News | Security

Microsoft started rolling out its 'Folder Protection' feature to OneDrive, which is also known as "Known Folder Move". This feature keeps your system safe and protected by automatically taking backup of important documents from user data folders like Desktop, Documents and Pictures.

 

If you are a Windows Insider, you might have already received this update in early July. For non-insiders, here's how to enable this protection.

Published by on under Known Folder Move | OneDrive

The recent Cambridge Analytica scandal made people realize how much information about themselves they share online. For those of you unfamiliar with the scandal, a company used a Facebook quiz to profile its users, collecting information - mostly limited to what people chose to share on their public profiles but sometimes, the private messages of Facebook users, too. Let's learn three common sense tips to protect your privacy online.

Published by on under Privacy | Security

Phishing, Vishing and Smishing are tactics, attempts or strategies used to obtain sensitive information and details such as usernames, passwords, credit card details, bank details etc. often for malicious reasons and disguising as a legitimate source.

 

While their sole aim is to trick people into giving personal information or make payments, Phishing, Vishing and Smishing can be done in different ways. Let's discuss these in details.

Published by on under Phishing | Security

Starting with the release of Google Chrome version 68, in July 2018, it will mark the unencrypted sites as "Not Secure". That means, if you have a website that does not have SSL certificate, Google will start notifying the users that the site is not secure.

 

To provide a safer experience to your users, you must install SSL certificate and start serving your site in HTTPS protocol.

Published by on under Chrome | Google

In a month of two, after the attack of 'WannaCry', a new Ransomware named 'Petya' started spreading across the world. It's a massive cyber attack that paralyzed firms, airports, banks and government departments that uses unpatched old Windows operating system.

 

Starting with Ukraine, it already spread many countries like UK, Spain and India. Check this post to know how to take precaution from such attacks.

Published by on under Petya | Ransomware

You might have already heard about 'WannaCry' or 'WannaCrypt' ransomware which affected many outdated Windows system across the globe and demanded BitCoins worth $300 to decrypt the affected files. This was spread via a vulnerability on Windows system.

 

Though a fix was already given by Microsoft to safeguard the attack, but a tool to decrypt the affected PC has been recently published by security researchers.

Published by on under Ransomware | Security

In last few days, you might have heard about 'WannaCry' or 'WannaCrypt' ransomware which spread affected many systems across the globe. This was spread like a worm by using the Windows SMB vulnerability, which was patched in March.

 

You might become a victim, if you are not running Windows 10 and not yet patched your system with all the security updates that Microsoft released.

Published by on under Ransomware | Security

Windows provides a Wi-Fi security page, from where you can view the connected Wi-Fi connection’s password or network key. By default, the key remains hidden but you can view it anytime. There might be some reason when you want to retrieve or view the password.

 

Today in this blog post, we will learn how to retrieve it. For this to work, you must connected to that network at least once. Continue reading to know more.

Published by on under Security | Tips

Not every system has the right folder permission set to all user account and hence, sometime we need special access to specific folder during installation or while executing the application. It is not possible to manually set it up by browsing the folder and hence an automation is mandatory.

 

If you are looking for a way to set the right permission to specific folder(s) using C# code, this post will help you. Continue reading to learn more about it and grab the code.

Published by on under .Net | C#

Sometime we need to provide an encryption mechanism to protect user data in phone and/or sharing the data over internet to a database. Data security should be always maintain by a developer to protect the content of the application that the user enters.

 

If you are building an app and looking for some way to implement the mechanism, here is a wrapper class for you to do encryption and decryption of a string literal easily.

Published by on under Security | Silverlight

In the last post “What is Two-Factor Authentication?” we discussed about various factors of authentication system including different examples. We also learnt about Knowledge Factor, Inherence Factor and Possession Factor.

 

Microsoft recently added a second step authentication mechanism in all their accounts as an extra security layer. This post will guide you to turn ON/OFF this security layer.

Published by on under Security | Tips

Two-factor authentication is a user authentication system where an user needs to provide two different factors to authorize the user’s identity. It is not a new concept and in many places we are knowingly or unknowingly using it for secure access.

 

There could be multiple factors too and that known as Multi-factor authentication. Today in this post we will learn basics about this type of authentication system.

Published by on under Security | Tutorial

Today I received this “Security Alert” from Microsoft via email and thought to share this with you. If you are using ASP.Net in your server, read this post to know about it to keep your server in good health from this DoS Attack. Sharing the email as it is in this post.

 

Microsoft is aware of detailed information that has been published describing a new method to exploit hash tables. Attacks targeting this type of vulnerability are generically known as hash collision attacks. Attacks such as these are not specific to Microsoft technologies and affect other web service software providers. This vulnerability affects all versions of Microsoft .NET Framework and could allow for an unauthenticated denial of service attack on servers that serve ASP.NET pages.

Published by on under .Net | News