Information security
Information protection
Wikipedia
The practice of preventing unauthorized access, use, disclosure, distortion, modification, research, recording or destruction of information. This universal concept applies regardless of the form that data can take. The main task of information security is the balanced protection of confidentiality, integrity and availability of data, taking into account the expediency of application and without any damage to the productivity of the organization. This is achieved mainly through a multi-stage risk management process, which allows identifying fixed assets and intangible assets, sources of threats, vulnerabilities, potential impact and risk management capabilities.

 

Social engineering
In one of the last articles, we discussed the changes in social engineering scenarios that the global COVID-19 pandemic provoked. Of course, it is impossible to consider all the subtleties within the framework of one publication, so today we will continue our conversation and tell you about the features of the attacker's physical penetration into the company's territory. It would not be superfluous to remind once again about the security measures that everyone should take in order not to become an unwitting victim.

 

Is clean and secure code a myth or a reality?
Each programming language is designed with different operating systems, platforms, coding styles and intended use in mind. We usually hear about Python, PHP, Ruby, jаvascript, Java, C, C++ and C#, as well as more modern versions of them, such as Rust, Swift, Hack and many others.

 

March 13 2022

Digital epidemics
The first computer viruses appeared back in the 1970s. They were conceived as harmless and more like games, the purpose of which was to distribute the program to the largest number of players. The participant whose program will make more copies of its own and fill the computers of others faster was declared the winner.

 

From Prototype Pollution to RCE on ZeroNight X
As part of this article, we will look at the vulnerability of Prototype Pollution on the client and AST-injection on the server and what their joint operation can lead to, as well as how they were embedded for training in the “Hack To Be Hired” competition on ZeroNights X from the Digital Security Academy.

 

User experience and security risks
Every second Thursday in November, World Usability Day is celebrated. This holiday was established in 2005 by the Association of Professionals in the Field of User Experience to promote the practicality, convenience and ease of use of digital products and services.

We, as users, share the values of usability, and as professionals, we can't help but think about security. In this article, from the point of view of security, we will consider some of the chips that are added to products and services for our convenience.

 

The security of the metaverse utopia?
A couple of decades ago, the Internet was a concept that only a few could use, but today it is an integral part of our lives. The same thing is happening with newer trends, and what is now the subject of discussion in narrow circles of specialists may soon become our new reality

 

Site Search

Site Menu


☑ Websites Scripts

Calendar

«    December 2024    »
MonTueWedThuFriSatSun
 1
2345678
9101112131415
16171819202122
23242526272829
3031 

Advertisement

Survey on the website

Evaluate the work of the site
 

Statistics

  • +5 Total articles 6751
  • +19 Comments 4234
  • +31 Users : 6069