Cybersecurity skills need boost in computer science degrees


University computer science courses are failing to make clear the need to develop skills in cybersecurity, leaving the UK with a shortage of experts
This is according to a paper published jointly last week by the Council of Professors and Heads of Computing and (ISC)2, the International Information Systems Security Certification Consortium.
“Twenty years ago very few courses paid any significant attention to security, and the situation has started to change, albeit slowly,” says “Perspectives: Integrating Cybersecurity into Computer Science Curricula”.
This is despite “a growing voice from industry that cybersecurity knowledge should be core to the disciplines of computing and information technology”, meaning such skills should therefore be “a key element of the computing and computer science curriculum, particularly at the undergraduate level”.
Currently most institutions offer computer science courses in which there is one module or unit – approximately 5 per cent of the total credits – dedicated to cybersecurity in a three-year degree, the paper claims.
It also notes that graduates find it difficult to enter the cybersecurity industry because “the supervisory cost of placements is very high for companies to take on many graduates of any kind in cybersecurity roles”.
“Academia must look at its curricula and accreditation requirements,” said Liz Bacon, president of the Chartered Institute for IT, adding it was also incumbent on industry to accept more trainees and placement students.
She said that more sandwich placements needed to be made available, and that lecturers could not single-handedly boost interest in cybersecurity among students, and that “talks from external speakers” and “war stories” from industry were more likely to excite students.
“It is not enough to integrate technical cybersecurity subjects into computing degrees as cybersecurity is an increasingly a diverse discipline, requiring a mix of business savvy, soft skills and technical skills for varied roles,” added Adrian Davis, managing director (Europe, the Middle East and America) of (ISC)2.

“Universities have a real opportunity to include and make explicit reference to cybersecurity topics within many degrees.”

In August, the first GCHQ-certified master’s courses were unveiled, with Edinburgh Napier University, Lancaster University, the University of Oxford and Royal Holloway, University of London, among those accredited.
Saturday, November 29, 2014
Posted by Unknown

Making Malware Cleanup Easier

Making Malware cleanup easier




You'll find a recommendation to install software to detect and clean up malware in almost any security guide. Although a single product isn't sufficient to defend against all modern security threats, the general recommendation persists because the technology remains effective in blocking categories of known threats and cleaning up malware infections if they find their way onto your computer. Since resolving a malware problem is a little bit different each time, we're committed to working with our partners to give people on Facebook the help they need in keeping their information secure.


Our goal is to make it easier for people to find and use the right technology to better protect their devices. We've worked with F-Secure and Trend Micro to incorporate free anti-malware software downloads directly into our existing abuse detection and prevention systems. These are the same systems that help us block malicious links and bad sites from among the trillions of clicks that take place every day on Facebook.
Tuesday, November 18, 2014
Posted by Unknown
Tag :

How to Unlock Pattern Locks on Android Devices

How to Unlock Pattern Locks on Android Devices

Nowadays many android phone users use the inbuilt “pattern locks” as a security to their phones. But the main problem with it is that, if you forget the pattern you used and you try out many wrong attempts, it gets locked permanently. So, just follow these simple steps to unlock pattern locks on your android device and use it again free of cost.


Unlock using Google Account :
If you don’t have data connection or internet access or if you don’t have your google account linked to your phone, then, you can skip this step and refer the Additional TRICK.
When you try different patterns and unable to unlock your phone in five attempts. Then a message pop-up and shows two buttons “next” and “try again”. Now click on “next” button and you see two options for unlocking phone. One is answer the security question and the second option is to provide Google account details.
Mostly people don’t set a security question. But if you set it then simply answer the question and unlock your device quickly. Otherwise check the Google account option and click “next”.Now provide your Google account username and password attached with your device and click on “sign in”. After that you are directed to choose new pattern and now you can unlock with this pattern.

1) Switch off the phone.
2) Now hold these buttons all together at the same time
“Volume up + Home Key + Power Button”
until the phone boots (if you device doesn’t have a home button just hold together volume up key   and power key)
3) Now a screen like DOS will come up with different options
4) Use the volume key to move up and down then scroll down to “Restore Factory Defaults” or “Delete all User Data” depending on which is on your device. Select this factory reset option and then press power button to let the action begin.
Now it asks you for confirmation, select “yes”.
5) After clicking on the settings above, now scroll down to “Reboot System Now” and wait for your phone to reboot (restart).

 



Monday, November 10, 2014
Posted by Unknown

What is keylogger? And how to be safe from Keylogger

WHAT IS KEYLOGGER? AND HOW TO BE SAFE FROM KEYLOGGERS
I am going to talk about the most use piece of software besides from RAT by hackers to observe your activities on your computer and that is keyloggers. A keylogger is a software or hardware device which monitors each and every key typed by you on your keyboard. I am going to talk about different types of keylogger and how to be safe from keyloggers. So lets learn somthing about keyloggers.

 1. What is keylogger ?
You might have heard about keyloggers but really dont know what they are reading this article will clear your mind. A keylogger also know as keystroke logger is software or hardware device which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their childrens or company owner to spy on their employes.




2. How it can harm you ?
In this section i will talk about how keylogger can harm you in different ways for example It can be used by your enemy or friend to get sensitive information such as your username and password, Bank credit card details, or any other activities you do on your computer.
Example: You login in to your Facebook account from a computer in which keylogger is install then your username and password will be captured.

3. Types of  keyloggers
There are two types of keylogger hardware keylogger and software keylogger. Software keylogger is install in your computer where as a Hardware keylogger is attached to your keyboard. Looking at below images will clear your mind.




4. How to Protect yourself from keyloggers ?
Keylogger  can be used by your enemy  to get sensitive information such as your Bank credit card details, or password of any social networking sites etc. In order to be safe keep following points in your mind.
Never use your online banking from cyber cafe. If you want to use then you can try this method. open notepad and type anything Then copy and paste each word that comes in your username or password.
You can even use above method to protect your facebook profile, yahoo or gmail id.

When you enter cyber cafe make sure that no hardware device is attached to keyboard wire. Its look something similar to above image.
Friday, October 24, 2014
Posted by Unknown

How to Recover Deleted Files on Pc

How to Recover Deleted Files on Pc
When you delete any file in windows it goes to recycle bin where you can easily restores it as it has restore option. But which method or hacks is used to recover your files when you delete it permanently (In windows by pressing Shift+DEL). Sometimes we accidently deletes images, videos and important document files from your pc, Pen drive, SD card or anything else then how can you recover it ? Well don’t worries about it there are many powerful file recovery software available on the internet which let you to recover permanently deleted files from your pc. As I told you that there are a lots of hard drive recovery services. Now I’m going to tell you the top best data recovery applications.



1. Recuva
Recuva is one of the most popular and powerful file recovery tool for Windows. You will find it very easy to navigate because of it’s clean interface user-friendly options. It has following features :
•           Undelete files on your computer
•           Recover deleted emails
•           Securely delete files you want to erase forever
•           Restore unsaved Word documents
Recovering files vis Recuva  is very easy you have to simply download and install the Recuva then after opening it now select what you want to restore. You can search for deleted Pictures, music, documents, videos, compressed files or emails. If you’re not sure about file name, just select ‘All Files’ option. Now select the file, either right-click on it press Recover button to recover it.
2. Panda Recovery
Panda recovery is the another best hard drive recovery service/tool for recovering files. It helps to recover deleted files from hard drive, USB, Network drives etc. It is best because of following features :
•           Browse, Search, Preview and Recover deleted files.
•           Recover Archived, Hidden, Encrypted, Compressed files.
•           Recover Images, Documents, Movies, or any other type of files.
•           Recover to Local Hard Drive, Network Drive, or Flash Drive.
The process of recovering files from Panda recovery is very simply you have to just follows wizard and its instructions.
3. Test Disk
This is also the one of best hard drive recovery service providing software. It is a powerful free data recovery software which helps to recover lost partitions andor make non-booting disks bootable again when these symptoms are caused by faulty software, certain types of viruses or human error (such as accidentally deleting your partition table). TestDisk is available for lots of operating systems, including Linux, Windows, and Mac OS, and supports lots of file systems. It has following features :
•           Fix partition table, recover deleted partition.
•           Rebuild NTFS boot sector.
•           Undelete files from FAT, exFAT, NTFS and ext2 file system.
•           Recover NTFS boot sector.
You need to be careful for using this and better to use on screen instructions while using it.
4. Reclai Me
This is another data recovering software. It is simple tom use because if it’s user friendly interface more ever it can recover files under Windows (FAT16, FAT32, exFAT, NTFS, ReFS file systems), Linux (EXT2, EXT3, EXT4 and XFS file systems), Mac(HFS, HFS+ and UFS file systems). It has following features :
•           Undelete a single file or multiple files.
•           Unformat a hard drive (desktop and laptop).
•           Recover RAW file system drive.
•           Recover data in case of boot failure.
Just simply follow on screen instruction to recover data using ReclaiMe.
5. Restoration
Last but not least, this one very simple to use. Restoration works with FAT and NTFS as well as digital cameras cards. It is also powerful tool for recovering lost/deleted data. It has following features:
•           Recover deleted files.
•           Undelete files.
•           Unformat a hard drive.
•           Photo recovery.
Just as others to use it simply follows the on screen instructions.

So, in this way you recover deleted files on pc and this is all about hard drive recovery service/tools. I hope this helped you a lot.
Thursday, October 16, 2014
Posted by Unknown

About 5 million Gmail IDs and passwords leaked

About 5 million Gmail IDs and passwords leaked



Is Google got hacked?
No, the leak was not the result of a security breach of Google systems.  The dump is said to have been obtained from other websites.
So, if you have used the same password used anywhere else, your Gmail account could be compromised.




Google's response:
"We found that less than 2% of the username and password combinations might have worked, and our automated anti-hijacking systems would have blocked many of those login attempts. We’ve protected the affected accounts and have required those users to reset their passwords." Google wrote.




What you should do?
•          There are few websites available online to check whether your Gmail ID have been compromised or not.  My suggestion is don't use them.  I suggest everyone to change the password. (I believe most of the people keep the same password for years, so it's better to change now).
•          If you have not enabled 2-step-factor feature, it is good to enable it.

•          Never use the Gmail password in any other websites.
Saturday, October 11, 2014
Posted by Unknown
Tag :

Security Encryption Systems

Computer encryption is based on the science of cryptography, which has been used as long as humans have wanted to keep information secret. Before the digital age, the biggest users of cryptography were governments, particularly for military purposes.





The Greek historian Plutarch wrote, for example, about Spartan generals who sent and received sensitive messages using a scytale, a thin cylinder made out of wood. The general would wrap a piece of parchment around the scytale and write his message along its length. When someone removed the paper from the cylinder, the writing appeared to be a jumble of nonsense. But if the other general receiving the parchment had a scytale of similar size, he could wrap the paper around it and easily read the intended message.




The Greeks were also the first to use ciphers, specific codes that involve substitutions or transpositions of letters and numbers.
As long as both generals had the correct cipher, they could decode any message the other sent. To make the message more difficult to decipher, they could arrange the letters inside the grid in any combination.

Most forms of cryptography in use these days rely on computers, simply because a human-based code is too easy for a computer to crack. Ciphers are also better known today as algorithms, which are the guides for encryption -- they provide a way in which to craft a message and give a certain range of possible combinations.
Computer encryption systems generally belong in one of two categories:

Symmetric-key encryption
Public-key encryption
Wednesday, October 1, 2014
Posted by Unknown

Total Pageviews

- Copyright © REDBACK COUNCIL - RISC -- Powered by Redback - Designed by Redback Council -