Social Engineering is the act of manipulating a person to accomplish goals that may or may not be in the “target’s” best interest. This may include obtaining information, gaining access, or getting the target to take certain action. Social engineering is generally a hacker’s clever manipulation of the natural human tendency to trust. The hacker’s goal is to obtain information that will allow him/ her to gain unauthorized access to a valued system and the information that resides on that system.
Dear Readers, in this edition I am trying to give some information about ‘User Identification’ which are very important to know and I am sure that it will help you all, to understand its importance in Information Security domain. Information technologies and its resources are an integral part of any business/ organization, and to secure them is a strategic priority. According to the current IT security breaches scenario, information security breaches are considered to be the most threatening issues both for private and public sector organizations.
Large spends on information technology by the government and the private sector in India was meant to bring the next big flush of funds, and projects, for Indian IT firms.
Great news for all Mobile phone users, coz from now onwards users will be able to send 200 text messages a day as sector regulator TRAI has doubled the daily cap after it received representations from consumers and service providers to relax the limit. TRAI had introduced the 100-SMSes a day cap to stop unsolicited and pesky text messages from telemarketers selling everything from real estate to weight loss solutions. The cap also put an end to subscribers using multiple SIM cards to send text messages without registering as telemarketers.
Dear Readers, in this edition I am trying to tell you something about ‘Information Security & its challenges’ which is very important to know in this Computer Era and I am sure that it will help you all in your relative fields. Over the past 10 years the Internet has become very important source in the India. People of all ages use it on a regular basis, and it has become one of the driving forces of the economy. From banking to shopping to communication, it has radically changed the way many people go about their daily lives.
Managing performance has become a buzz-phrase of management. What is meant by Performance Management or Managing Performance varies enormous. For some, it means manipulating pay and other reward systems so that people will work harder. For others, it means telling staffs what they should do. Other people think it means increasing people's understanding of the whole process so that they know what they are doing and why.
THE UK has developed weapons to counter the threat from hackers and will strike first to protect itself, according to Foreign Secretary William Hague. Hague has warned that the Government is investing heavily in deterrents but admitted he could not be certain they would be sufficient in repelling Cyber Attacks. He told the Sun, "We will defend ourselves in every way we can, not only to deflect but to prevent attacks that we know are taking place.
Cyberspace concerns extend throughout the Asia-Pacific region, and they are increasingly playing key roles in how nations define security and threats. SMi Group’s inaugural Cyber Security Asia conference and exhibition is well timed to offer delegates the opportunity to discuss the key issues surrounding security in cyberspace. Don’t miss the chance to network with a diverse mixture of professionals from the Cyber Security community and examine key issues including: cyber warfare, cyber terrorism, cloud computing, cyber commands and military cyberspace operations.
The Cyber Security Evaluation Tool (CSET) is a Department of Homeland Security (DHS) product that assists organizations in protecting their key national cyber assets. It was developed under the direction of the DHS National Cyber Security Division (NCSD) by Cyber Security experts and with assistance from the National Institute of Standards and Technology. This tool provides users with a systematic and repeatable approach for assessing the security posture of their cyber systems and networks. It includes both high-level and detailed questions related to all industrial control and IT systems.
The Global System for Mobile (GSM) communications, the standard for mobile phones and Internet in 1988, may no longer be so secure after a German hacker team cracked its encryption algorithms.
After cracking the code, Karsten Nohl plans to publish a guide to prompt global operators to improve their safeguards, The Hacker News reported over the weekend.
“With our technology, we can capture GPRS [General Packet Radio Service] data communications in a radius of 5 km," The Hacker News quoted Nohl, head of Security Research Labs, as saying.