This post was provided by Samantha Strauss on behalf of Drexel University Online. She has written freelance tech articles for a number of educational institutions, including Drexel University. A self-taught programmer, she has spent over a decade working in the tech industry.
Though it’s been plaguing us for quite a while, SQL injection is still one of the most common forms of web site security breaches, as evidenced by recent hacking attacks on such web giants as Sony, Yahoo and LinkedIn, among others. SQL, which stands for Structured Query Language, is just what it sounds like: a language–almost, in fact, THE language that databases use to store, manage, and retrieve information. Continue reading
Scareware, aka fake antivirus, as you may know, is a form of malware usually obtained from a malicious Internet website, that displays ominous warning messages on your PC that states you have been infected with malware. It usually runs a fake malware scan and warns that it has found a very dangerous malware that it will remove for a price. In many cases, the computer is locked up during this process and Continue reading
A recent CNet.com article reports that “At its I/O conference, two of Google’s top-level security experts, the director of security for Google Apps, and the head of Chrome security; say the company is intensely focused on the issue, but passwords remain a thorny problem.” The “company”, Google, being intensely focused on security; in my opinion, remains to be seen. However, they stated “Unfortunately the human is often the weakest link in security.”
What a smoke screen! Instead of owning up to royally missing the boat on Google apps for the Android available through Google Play store, they talk about Continue reading
Here’s a great article I found on the Kaspersky Lab Security site. This is good stuff you should be doing to remain safe as you and your computer use the Internet.
With online banking and shopping offering greater convenience, more and more people are using the Internet to conduct financial transactions and make purchases. However, cybercriminals are capitalizing on opportunities to steal consumers’ passwords, identities, and money. Continue reading
A Net-Security.org article states that Android malware continues to rise. F-Secure Labs reports that a new method of distribution of malware to Google Android smartphones has surfaced in the first quarter of 2013—email spam. There appears to be movement from app-based malware to email spam as the method of infecting Android phones. Continue reading
A recent BusinessInsider.com article announced that the Facebook app for Android Smartphones can change your audio settings, record audio, and take pictures and videos at any time and without your confirmation. Sounds like fun, huh? Especially since there is already malware that can take control of Android phones, Continue reading