• How to trace and prove who’s hacked my phone

    My phone was somehow accessed by a woman I met asking me to buy my used generator. She then used info from there to hack into my laptop, which uses a Wi-Fi router to get on line. She then began using my bank card to pay her bills, etc. Last year I finally changed my phone # (she was able to turn...

    ImSoConfused15 pointsBadges:
  • Why we require DAST and SAST, if secure design review is in place?

    I have a query what does Secure Design review don't cover? Why we require DAST and SAST if secure design review is in place (due to low budget this question is raised).

    Rithin5 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • Is PING.EXE a virus?

    I saw in my procceses a procces name ping.exe for 2 seconds. Is it a virus?

    8mmppp5 pointsBadges:
  • Apply SFTP on AS/400

    How can we apply SFTP on IBM AS/400 I720?

    BadarMateen5 pointsBadges:
  • Database for insurance auditing system

    Hi everybody, I'm an Oracle developer working on an insurance auditing system. I'm looking for a database that includes the International classification of diseases (ICD10, ICD11) for each diagnosis all of the associated procedures, lab tests and medicines to make the system automatically approve...

    Ahmad0065 pointsBadges:
  • Change Visual Basic security settings

    On Visual Basic, I have several processes running at the moment. Now, I saw that I'm able to change the security settings through Process Explorer but I'm wondering if there's a chance I can do it using the command line.

    ITKE977,745 pointsBadges:
  • Is this the right BYOD security plan?

    Dears, we have many users with mobile devices (not owned by The Business) need to check the Email, send report via Whatsِapp or other APP and they use direct connection to the internet as you know vulnerabilities with Android. They may be send message infected by malware to person on our local...

    Elyassalman5 pointsBadges:
  • Cybersecurity

    What is cybersecurity?

    MONIKABHATHEJA5 pointsBadges:
  • Which certs should I take first?

    Hi everyone, completely new here so.. Here goes my question. I'm currently taking a diploma of Cyber and Digital Security, which covers on networking and ethical hacking (all very lightly). After this Diploma, I'm planning to head more into the network and security side (following the steps of my...

    Benjilee5 pointsBadges:
  • Business analyst role/job description

    Hi, What is the standard business analyst role/job description according to COBIT? Thanks and regards,

    cellepel5 pointsBadges:
  • csrss.exe

    Csrss.exe - I looked at this in my task manager, but I cannot click right and find its properties, everything else is fine and all have 'user name' But not this one. I found several copies in other folders but none in system 32 where it is supposed to be. The ones in the other folders all have...

    fcuku210 pointsBadges:
  • Is someone hacking me?

    I am not a technological expert. Through hacking test, I found this IP address 192.168.1.65 and 192.168.1.64 intervening with my privacy however it is shown as private network. No location found. How do we find the hacker?

    Samacha5 pointsBadges:
  • Who hacked my wife’s phone?

    My wife's phone has been hacked. We go to bed and her phone will have new apps downloaded when we wake up. What should we do?

    ShannonRichards10015 pointsBadges:
  • Secure login system for college database

    For my final year project I want to make a secure login system for my college database and lab system. So to implement such things, I want help of experts what can I do. I submitted my topic for Server Security system, but I don't have idea what to do. Please help me

    HarshalShende5 pointsBadges:
  • How to stop a person from hacking my phone

    How can I stop a person from hacking my phone?

    Animelover1015 pointsBadges:
  • Antivirus for external hard disk

    I have 1TB external HDD. I want to know if it is possible to install any antivirus in my external hard drive because I might plug it in another computer that doesn't have an update and that has a virus. Which one is good antivirus for external hard drive?

    pdsathishkumar3,790 pointsBadges:
  • Why should I use a cloud antivirus for my PC?

    What is the difference between antivirus and cloud antivirus. Why should I use a cloud antivirus for my PC?

    matthewsstacey30 pointsBadges:
  • What malware remover is out there for me?

    Is there a malware remover for Locky, Cryptowall, and Zepto malware?

    bolanleo35 pointsBadges:
  • Why does my URL change when I click the “Mail” icon in yahoo?

    While using one of my yahoo accounts, I find that when I click on "mail", the url changes; one of my received e-mails, should not have a security code attached to it in the subject line and the nature of the e-mail is "sex-toys", something I would not be interested in.

    Pukiom215 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following