- C : CONFIDENTIALITY: Confidentiality prevents unauthorized disclosure of information.
- I : INTEGRITY: Integrity assure that data can’t be modified in an authorized manner.
- A: Availability: Information should be readily available for authorized users.
Short Bytes: Gmail phishing is one of most common methods used by hackers to compromise the online security of naive users. But, a recent Gmail phishing attack, uncovered by Wordfence, mimics your past conversations and attachments, succeeding in fooling even the tech-savvy netizens. To counter this attack, users should make sure to verify the https:// protocol and hostname in the address bar.
For many of us, getting our Gmail accounts hacked would mean the endgame. It’s the path that helps the hackers to gain the ultimate access to our digital lives. By doing so, one can access our personal identifying information, take control of our online accounts, and whatnot. That’s why, at Fossbytes, we try to explain such security risks often in a very simple language to reach out to the maximum number of users. Continue reading
Police departments around the nation have taken predictive crime prevention to a new level by building fake user accounts, as well as posing as genuine people to gather information about local events, Tech.Mic reports.
Local agents put on a “digital mask” and pose as “members of the community,” allowing them to gather personal information about suspects they consider a high risk of being involved in a future crime or have existing charges. Continue reading
Short Bytes: If you want to make the best possible use of your spare time, check out the Santa Tracker and Santa’s Village by Google. Here, you can play some games and know interesting stuff about Santa and Christmas. Continue reading