Category: Application, Data, & Host Security

Educate yourself on how to harden your own systems

Tips for Securing Your Network

Before I begin, let's address two obvious questions. Number one, what kind of network are we talking about here? I'm referring to a large or enterprise network. However, you can implement some of these security solutions on your home or SOHO network. Well, maybe you wouldn't want a network access enterprise server at your home. ...

A Single Text Character From The Telugu Language Can Crash Any Apple Device

An Italian researcher has recently discovered a text bug that can crash any Apple iPhone, iPad, or Mac. A single character from the Telugu language, which is a language native to India, will crash the device when sent via the iOS messaging app, What’s app, Facebook Messenger, Gmail, or even in the iOS Notes The ...

Understanding and Identifying Logical Ports

Identifying Logical Ports There are two types of ports: physical and logical ports. Physical ports are the RJ-45 female jacks that are attached to a switch, router, firewall, server, patch panel, or Ethernet outlet. I've provided some examples below. The ports I'm talking about, however, are logical ports. Understanding Logical Ports In computer science, a ...

Control Types

Control Types After a user has been identified and authenticated, the next security measure involves authorization and access control. From a broad standpoint, there are three main security control classifications that cybersecurity professionals base on their implementation. They are technical, management, and operational. Technical Controls Technical controls are any controls (both hardware and software) utilizing ...