search

Category: Web Security


USB Canary Tells You When Someone Plugs Something Into Your USB Ports

Posted by in Programming News, Web Security

The concern for computer security is a legitimate one, especially at this point of technological development. A lot of personal information is stored in our devices and some of them are always exposed to hackers.   Just by introducing a malicious pendrive, any novice hacker can access your session without having the password, steal data,…


Google’s Contest Reveals No Major Vulnerabilities For Android

Posted by in Programming News, Web Security

Every month, Google launches a series of security patches to solve all possible security flaws detected in the operating system by its own engineers and make it more secure and shielded from the threats that hide in the network . In addition, from time to time, it launches a series of contests and reward programs…


USCIS Releases New Guidelines for Programmers Using the H-1B Visa

Posted by in Programming News, Web Security

Programmers moving into the United States using the H-1B visas will have to look for other alternatives as the US Citizenship and Immigration Service has implemented new measures that will block them out. This follows some guidelines that were released on Friday last week. For skilled computer programmers, they will have to use temporary visas…


Apple Hackers are All Hype

Posted by in Programming News, Web Programming, Web Security

Despite claims that millions of iCloud accounts have been compromised Apple has told the media that no such attack occurred. Perhaps it was all an April Fool’s day prank or perhaps it reveals something a bit more sinister. In an era of fake news and questionable facts, it seems that hackers boost their image by…


Users Won’t See Captcha Anymore

Posted by in Programming News, Web Security

Signing into a website or making a payment online often requires the website user to prove they are not a robot. This is typically done through the use of Captcha inputs. Users have to solve puzzles, visual or auditory, to prove they are not an automated system attempting to game an automated system. However these…


What to Expect From Next-Generation Mobile-Security Features

Posted by in Mobile-Security, Programming News, Web Security

The ability to ensure that the data and account information stored within a smartphone tablet or other mobile device is able to be kept as secure as possible is never a consideration that should be taken lightly. Despite potential setbacks with the latest generation of security features, such as facial recognition, users may soon be…


Online Threats to your Cyber Security

Posted by in Cyber Security, Programming News, Web Security

Each day there are news flashes and catchy phrases that are often making it known to the public about the latest hacks or threats to our cyber security which seem to occupy our social media updates and television press circuits. While there may be many bad characters out there who are motivated on carrying malicious…


Overview of Programming Languages in High Demand

Posted by in Programming News, Web Security

Marc Andreessen once declared that “Software is eating the world”. This means that there is a need for programmers to write the software. There are so many programming languages that exist in the world but some are far more popular than the rest. When a software company is looking to employ new employees, it will…


Cloudflare Security Breach

Posted by in Cloudflare, Internet Security, Web Security

Cloudflare is a United States-based company that provides Internet security and enhances website performance of the websites associated with it. The company has recently been faced with a security breach when a bug caused portions of data to leak from its customers’ websites.   An investigation by the name Cloudbleed has been launched to get…


Ethical Hackers Are In High Demand

Posted by in Programming News, Web Security

Hackers come in two modes, the ethical one is known as a ‘white hat’ hacker, and the unethical one is known as a ‘black hat’ hacker. It is the latter who poses a significant threat to businesses. In an age where e-commerce, mobile-based services, and online data storage is the most suitable way of running…


‹ previous posts next posts ›
close
search
Categories

Hi, guest!

settings

menu