Press "Enter" to skip to content

Posts published in “Security”

Online Privacy

How safe do you feel when using the internet? Do you feel like there is someone gazing over your shoulders whenever you are entering payment…

One Time Passwords as a Means of Authentication

One time passwords are used to secure modern information systems and reduce the chances of unauthorized parties gaining access to information that does not belong…

Network Security

All kinds of security threats lurk close to networks and being able to keep a network safe and secure from these threats is very important.…

Mobile Antivirus

Mobile devices tend to suffer a lot of attacks and information corruption attempts that are varied out by applications and malware that installs itself when…

Mechanisms Underlying the Operating System

The operating system is composed of several components that take care of translating the instructions from the users through the input devices as well as…

Measuring Customer Engagement on your Website

Customer engagement is a useful metric for determining how well your website is progressing in terms of keeping customers. By keeping customers engaged on your…

Malware

Programs that are designed by hackers to be used in attacking other systems are known as malware and tend to be quite harmful. Malware is…

Key Length and Security

The security of information systems and the key length applied in encryption is very closely related to each other and determines the level of security…

Keeping your Defenses Firm

Any information system used at a company, business, or organization tends to be connected or networked to the outside world and users through a network…