Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Holidays and Christmas Online Shopping Security Tips and Guidance

Written By Lingkar Dunia on Sunday, December 11, 2011 | 8:16 AM

Internet Shopping or Online Shopping is always consider a high risk and people always avoid to do shop online because of a huge security flaws and hackers. It seems that online shopping is really getting popular and people always consider online shopping a best and easy way to purchase or buy things through internet. People shop and buy things online occasionally to send gifts to their loved ones, friends or families, but people have to look into some security majors to avoid any fraud and to purchase safely.
Following Infographic will helps you to understand how you can do secure shopping on internet. Most of the people prefers to do online shopping�s on holidays, occasions, events or on Christmas, as we know Christmas is near and most of the people wants to buy gifts and other things for their loved ones, friends and other family members. Have a look into following Infographic to better understand Holidays and Christmas Shopping Security Tips and Guidance.

Internet/Online Shopping Security Tips and Guidelines

Click to Enlarge Image!
8:16 AM | 0 comments

Lock Google's Account with SMS Code - Google's 2-Step Verification Method

Written By Lingkar Dunia on Tuesday, December 6, 2011 | 5:16 AM

Google has always known for its extraordinary features for its products. Google always try to introduce such features which no one in industry provides to its users and now Google has comes one step forward to introduced "2-Step Verification" method for all of its Google Accounts and Google Products. Now Google users can able to lock up their Google Accounts through their cell phones.


Google's 2-Step Verification provides users an strongest level of security to your Google Account by necessitating you to have access to your phone as well as your username and password when you sign in to any Google's product and service online. Additionally you will require entering a code that Google will send you via text or voice message upon signing in.

According to Google Official Statement;
"2-step verification drastically reduces the chances of having the personal information in your Google account stolen by someone else. Why? Because hackers would have to not only get your password and your username, they'd have to get a hold of your phone".
I am personally using 2-step verification method and i strongly recommend all users to switch over to it. With their "2 step verification system", u can lock your account with your mobile phone and it is virtually guaranteed that only the person who's in possession of the Mobile No. (YOU) will be able to access the account.


For more information regarding How it works and How to setup 2-step verification Click Here.
5:16 AM | 0 comments

Facebook Pays 500$ to $40,000 for Facebook Bug Report - Hack Facebook and Earn

Written By Lingkar Dunia on Wednesday, August 31, 2011 | 9:13 AM

Do you want to earn some money and penny from Facebook?, now you can, Facebook has started a program called "Bug Bounty or Bug Spotter" it�s a program which Facebook has started three weeks go with an initiative to make security more strong and to avoid security flaws of a website of 750 million users. Facebook invites all security researchers including professional and also hacker hobbyists� persons to come and hack Facebook website.


Facebook wants you to Hack and Trace all security majors and find security flaws within website and if you are able to find it than you can send details of that particular hacking to Facebook and Facebook will pay you at least 500$ at startup and more. Facebook said this week that that it has paid out more than $40,000 under its new "bug bounty" security initiative. 

According to the Facebook spokesman;

"We've already paid a $5,000 bounty for one really good report," Facebook Chief Security Officer Joe Sullivan wrote in a blog post. "One person has already received more than $7,000 for six different issues flagged."

According to Sullivan;

"We realize, though, that there are many talented and well-intentioned security experts around the world who don't work for Facebook."

Although the social networking has its own security team, Facebook launched its bug bounty program to tap into the collective wisdom of the site's 750 million users. Researchers from more than 16 countries have successfully submitted bounty bugs, Facebook said. Its public "thank you list" names dozens of contributors.

You're all invited, come and contribute your talent and show the world who you really are.
9:13 AM | 0 comments

Pakistan To Ban Encryption Software And VPN Connections Within Country

Pakistan's Telecommunication Authority (PTA), a governing body in Pakistan which looks after and maintains country's network traffic and also examines website structure and its access points within country has blocked encryption VPN connection in Pakistan due to terrorism and other hacking activities. It�s not a first time that Pakistan has banned any particular website or connection, In past Pakistan and PTA had also banned popular social networking website "Facebook� because of blasphemous material about the religion on Facebook.

According to the Guardian report, the banned was made over encryption and VPN connections specifically targeting Virtual Private Network (VPN) in country. All internet traffic in the country travels through the Pakistan Internet Exchange, which can be intercepted by the military and civil intelligence agencies. The move echoes a crackdown against encrypted communications across the border in India and in China. 

People have been using VPNs to bypass the filters, access data, and send private communications, but the PTA is requiring ISPs to report customers who are still using this technology. In Pakistan most of the company's owners are not happy with this step from PTA because in Pakistan many local and international companies use VPN technology in order to maintain an end-to-end tunnel that can be used to encrypt sensitive data between branch offices, and those connections will fall under this ban. According to the PTA note people can request waivers to this ban, but it is unclear how that process will work and who will be allowed to apply for these exceptions.

The Pakistan Telecommunications Authority legal notice urged ISPs to report customers using "all such mechanisms including EVPNs [encrypted virtual private networks] which conceal communication to the extent that prohibits monitoring". Anyone needing to use this technology needs to apply for special permission
8:51 AM | 0 comments

Google Data Centers Security and Protection Video Revealed

Written By Lingkar Dunia on Saturday, April 23, 2011 | 1:04 AM

Google has revealed a video about companies Security and Data Protection measures which has been taken from Google to protect their Data Centers from any damage or theft threats. Its a secret video which has been released from Google for customers to know how Google manage its enterprise customers from harm. The narrator points out, for example, that Google builds its own custom server technology and develops its own secure Linux OS to run its centers.

This seven-minute video emphasis on the security of data centers� physical security and server reliability protocol. Google utilizes restricted barriers, security fencing, video cameras, security guards and biometric scanners to prevent unauthorized access. The video even features tools such as �the crusher� and �the shredder,� both of which are designed to completely destroy old hard drives so nobody can ever access customer data.

Watch this Video about Google's Security Measures in Google Data Centers.
1:04 AM | 0 comments

Categories

Blog Archives