Web browsers are software applications that are used to access information from the World Wide Web. As the popularity of smart phones grows, the use of web browser has increased too. Over the years, leading companies that offer web browsers (Chrome, Firefox, Internet Explorer and Opera, to name a few) have enhanced the functionality of their web browsers.
In the last article, we saw how miscreants exploit browser architecture vulnerabilities to target unsuspecting victim. In the second installment of browser vulnerabilities, we will explore other means whereby browser integrity is compromised to target users.
Information security was not a serious concern in Canada in the 1970s. Yes, there were hackers at that time as well, but a majority of the cyber attacks were more for bragging rights rather than personal gains.
The phenomenal growth in the use of internet has raised concerns about cyber security. In Canada and elsewhere, companies that provide cyber security / information security services are in demand. There are various types of cyber security threats; we will cover them in this cyber security primer in two parts. The first part discusses about malware, the second discusses about e-mail related threats.
In the previous article Since they have been introduced, e-mails have changed the way people communicate. Gone are the days of snail mail, when letters used to take days to be delivered. More, if you were to send international mail. The prolific use of e-mails has brought about its own share of security threats. Here are a few concerns that need to be addressed while dealing with e-mail.
Cyber hacking is on the rise. Interception of messages, important e-mails and snooping is increasingly common nowadays. Companies that are aware of cyber risk are turning to cryptography to protect their valuable data. Indeed, not only in Canada, but in other countries too, more and more companies are turning to information security providers to provide data encryption services.