Back in 2014 when Google announced that HTTPS would become a ranking signal, many website and web application owners made the jump from HTTP to HTTPS in search of a small rankings edge. Along with a push to have more sites implement HTTPS came an increase in the use of language related to web application security. Many people began to incorrectly associate HTTPS with a website or web application that was more secure. In this
What is data? The whole world keeps talking about data and its security. You might have already heard a lot about cyber security/data security and nowadays you might also be hearing a lot about websites of companies getting hacked and their data getting leaked, causing a huge loss to them. So data is basically everything that you save on your digital devices or external storage devices or in online storage
Hey guys, welcome to our another tutorial for recovering data which is lost or deleted from your pen drive. We often come across this problem when we have lost a very important data due to a virus or deleted some files accidentally.let’s see how to recover that data like a professional. There are various tools to recover lost data. but I find photorec very useful for recovering most of the data.
Did you know that you can use Windows Registry Editor to check if a USB device was connected or not to your computer! by ‘USB Device’ i mean any device that can be connected via USB port of your computer.In some cases it can be a very serious matter.for example your friend’s external hard drive is caught by the police and it contained child pornography.it is very crucial to prove that
Another chapter in Russia and China friendship with a cyber security pact.A 12 page agreement written in Russian and as reported in ‘the wall street journal’. The two countries mutually promised to interchange information between law enforcement agencies, exchange technologies to ensure security of information infrastructure, the document says. Recently china accepted that it does have a cyber army.and not that cyber army will not be used against Russia.According to the deal,both
In our recent article, we talked about how to secure your data and why it’s important. Anyway, there are chances that you may not always be lucky and someday some account of yours gets hacked. So today we will talk about what to do after you have been hacked. This article will serve as a first aid for you in such case. YOU HAVE BEEN HACKED!!! What if, one