Profile cover photo
Profile photo
A Mitra
416 followers -
I do research on various aspects of Computer Security.
I do research on various aspects of Computer Security.

416 followers
About
A's posts

Post has attachment
We usually download applications for our mobile devices from app stores. Many a times an application gets discontinued from app stores for various reasons. But, users who have already downloaded the application on their mobile devices do not get any notifications about that. And, sometimes an application already downloaded in a mobile device becomes outdated. And, the user do not update the application. These applications are called Zombie Applications. These Zombie Applications pose a serious security threat.

How do Zombie Applications pose a security threat actually? And, what can we do to protect ourselves ?

To know more :

Post has attachment
When you Google Search the term security apps, you get a ton of antivirus and anti-malware app listings. Unfortunately, that’s a very narrow view of what’s out there. There are tons of apps that can boost your security. Most of them are fairly easy to use and don’t use a ton of resources. Here are the best security apps currently available on Android.

Post has attachment
Your smartphone is your lifeline to your business when you're on the go. If you lose that smartphone, sensitive company data (and even personal data) could fall into unwanted hands. There are plenty of third-party apps and security systems that can help you to protect that data — but sometimes, you simply must wipe the phone clean of anything that could bring about disaster to you personally or your company.

This article walks you through the steps of remotely wiping your Android device without the help of third-party solutions. 

Post has attachment
According to Cloud Security Alliance (CSA), over 70 percent of the world’s businesses now operate – at least in part – on the cloud. With benefits like lower fixed costs, higher flexibility, automatic software updates, increased collaboration, and the freedom to work from anywhere, 70 percent isn’t a big surprise.

Still, the cloud has its share of security issues. This article shows a big picture view of the top 10 security concerns for cloud-based services you should be aware of.

Post has attachment
This article describes the necessary steps to configure two-factor authentication (2FA) using Google authenticator on an Ubuntu 16.04 VPS. This application includes implementations of one-time passcode generators for several mobile platforms. This method adds another layer of protection to your server adding an extra step to the basic login procedure. 

Post has attachment
Linux distributions can leverage an extensive range of commands to accomplish various tasks. For most Linux distros, Bash (bourne again shell) is the default command-line interface or shell used to execute these commands. The article contains A to Z list of Linux commands, which includes as many commands as possible which can be run using bash.

Post has shared content

Post has shared content
The Ultimate A To Z List of Linux Commands | Linux Command Line Reference

Post has attachment
What are AI, Machine Learning and Deep Learning actually ? How are they different from each other ? And, how can they improve cybersecurity ?

To know more :

Post has attachment
Pharming is a scamming technique in which attackers redirect traffic of a legitimate website to another fraudulent website with the purpose of spreading malware or stealing sensitive data from victims. How do attackers perpetrate pharming actually & how can we safeguard ourselves ?

To know more :
Wait while more posts are being loaded