Close

(85) Information security, Bilgi güvenliği

Information security, often referred to as infosec, is the practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction to ensure its confidentiality, integrity, and availability.

CrowdStrike’ ın Hatalı Güncellemesiyle Oluşan Küresel Kesinti Bilişim Sistemlerini Etkiledi 

CrowdStrike' ın Hatalı Güncellemesiyle Oluşan Küresel Kesinti Bilişim Sistemlerini Etkiledi 

Bugün yayınlanan Crowdstrike güncellemesi windows temelli sistemleri çökertti. Küresel BT kesintisi, havalimanları, bankalar, sağlık hizmetleri ve küresel bazı şirketlerde kaosa neden oldu. Yanlış güncelleme Crowdstrike’ e ait olmasına rağmen sadece windows temelli bilgisayarlarda mavi ekran vererek sistemlerin açılmamasına yol açtı.  Crowdstrike yazılımı sensör adı verilen bir sistemle, işletim sisteminden önce […]

Devamını Oku

Beyond the Walls: AWS GuardDuty’s Watchful Eye on Your Cloud.

Beyond the Walls: AWS GuardDuty's Watchful Eye on Your Cloud.

AWS GuardDuty is a cloud-based threat detection service that monitors your AWS accounts and workloads for malicious or unauthorized activity. You can use AWS GuardDuty to detect and respond to threats such as compromised instances, reconnaissance, port scanning, denial of service attacks, and more. AWS GuardDuty can also integrate with […]

Devamını Oku

Enhancing IoT Security: FBI’s Vital Recommendations for Device Safety

Enhancing IoT Security: FBI's Vital Recommendations for Device Safety

In an era of ubiquitous Internet of Things (IoT) devices, their security has never been more crucial. The FBI, recognizing this need, advises that IoT device owners place these gadgets on a separate network. This precaution aims to mitigate the risk of hackers increasingly targeting such devices. The rationale is […]

Devamını Oku

Is AWS Chatbot the Next Big Thing in Business Communication or Just Another Botched Attempt?

What Is AWS Chatbot?

AWS Chatbot is a service provided by Amazon Web Services (AWS). It allows you to create and deploy chatbots in various messaging channels like Slack, Amazon Chime, and Microsoft Teams. With AWS Chatbot, you can configure chatbots to monitor and interact with your AWS resources, such as Amazon CloudWatch and […]

Devamını Oku

Google Chrome Introduces Innovative “IP Protection” to Enhance User Privacy

Google Chrome Introduces Innovative "IP Protection" to Enhance User Privacy

Google is set to test a new feature in Chrome named “IP Protection,” aimed at bolstering user privacy. This feature, which masks users’ IP addresses using proxy servers, is Google’s response to the increasing misuse of IP addresses for covert tracking. IP addresses are crucial for web functionalities like traffic […]

Devamını Oku

Data Breach Alert: 2.6 Million Duolingo Users’ Information Leaked on Hacking Forum

Data Breach Alert: 2.6 Million Duolingo Users' Information Leaked on Hacking Forum

The article from BleepingComputer reports a significant data breach involving the scraped data of 2.6 million Duolingo users, which was leaked on a hacking forum. This breach poses a risk of targeted phishing attacks using the exposed information. Key Points of the Duolingo Data Breach The Duolingo data breach highlights […]

Devamını Oku

Reflections on Trusting Trust by Ken Thompson

Reflections on Trusting Trust by Ken Thompson

In his Turing Award lecture titled “Reflections on Trusting Trust,” Ken Thompson delves into the complexities and inherent vulnerabilities in trusting software. He begins by acknowledging his contributions to UNIX and his collaboration with Dennis Ritchie, emphasizing the collective effort behind the project. Thompson identifies himself primarily as a programmer […]

Devamını Oku

Fortifying MQTT Infrastructure: A Five-Pronged Approach

Fortifying MQTT Infrastructure: A Five-Pronged Approach

The article from IoT For All, authored by EMQ Technologies Inc., presents a comprehensive overview of strategies to enhance the security of MQTT infrastructure systems. Here are the key strategies outlined: Building a culture of security awareness through employee training, security policies, and regular drills is also emphasized as a […]

Devamını Oku