Category: Access Control, Authentication, & Identity Management

Learn how security and network administrators restrict access, grant authorization, and authenticate their users.

Over 3,000 iOS and Android Apps Leak 100 Million User Sensitive Records via Misconfigured Firebase Backends

When building an app that needs to store and share data from a server, software developers can rely on Google's Firebase Realtime cloud-hosted database. This Infrastructure as a Service (IaaS) removes serious time constraints by providing app developers with maintenance and support, offline support, and real-time synchronization of data with clients in real-time. And, since ...

Firewalls: A Fundamental Introduction

The defense in-depth design is a security philosophy that proposes we protect our assets and networks with multiple levels of security. The idea is not strictly limited to technical security controls, as management and operational controls have their rightful place in the defense in-depth approach. However, many aspiring and enthusiastic young learners falsely attribute the ...

7 Ways to Respond to Network Threats

With the re-awakening of ransomware attacks that plagued many networks last year, cybersecurity is arguably at the top of every network administrator's priority list. With that being said, here are 7 ways to respond to network threats. 1. Network Segmentation In specific circumstances, network segmentation, which is a process by which we separate parts of ...

Your Live Security Camera Footage May Be Broadcasted Online: And You Wouldn’t Know!

Live video feeds of home and commercial surveillance cameras around the globe are being broadcasted live and without permission on a site called Insecam, which is believed to have originated from Russia. Other sites like Shodan and Nestcamdirectory also provide visitors with the ability to look up IP cameras; however, Insecam aggregates these live video streams all into one ...

Covert Channels: How Insiders Abuse TCP/IP to Create Covert Channels

The TCP/IP protocol suite, our conceptual model we use to explain the way in which data travels across a network, contains a myriad of communication protocols. The TCP/IP protocol suite generically refers to two main protocols: TCP and UDP, but there are many other protocols, some of which can be abused to create covert channels. ...