Wednesday, 24 September 2014

Top Talent Challenge



How well do you think you know of Danish Science? Here's an amazing opportunity for you to challenge yourself and GET REWARD.
Read on...
Innovation Center Denmark invites you to test your knowledge of Danish Science, Education and Business for the chance to win a fully-paid study trip to Denmark!


Get in here to access the Challenge page and be happy you do!

Challenge Page
Best of luck


NFC versus Bluetooth



Most Smartphones users have connected to another Smartphone or device, such as a wireless headset, using Bluetooth before, or have at least heard of the concept. Bluetooth can connect to devices up to 32 feet away, yet near field communication can connect to devices at a maximum distance of 4 centimeters on average.

Why is NFC so exciting if it is so limited in range?

Unlike Bluetooth, NFC can interact with another device with a single wave of your Smartphone.
It’s fast and requires little effort on your part. In contrast, Bluetooth connections take time and require many steps to activate. With such a close range between devices required, the potential for signal interference or hackers trying to steal your data is reduced. Let's go a bit deeper.

With the current trend of its presence in almost all major Smartphones, you should be able to handle it well.

Monday, 15 September 2014

Your iPhone’s Biggest Weakness May Be Your Computer



Less need to be said about the huge trend the iPhone is attracting & moreso with the latest iPhones 6 and 6.1. In spite of this, there are security measures you as a user NEED to put in place to avoid loss/damage.
Mobile malware is the fastest growing security threat we face today. But that threat has long been lopsided, and unfortunately, Android mobile operating system has seen the brunt of attacks due to its immense popularity and accessibility around the globe.

SHOULDER SURFING



What does Shoulder Surfing mean?
Shoulder surfing refers to the act of obtaining personal or private information through direct observation. Shoulder surfing involves looking over a person's shoulder to gather pertinent information while the victim is oblivious. This is especially effective in crowded places where a person uses a computer, Smartphone or ATM. If shoulder surfing occurs when there are very few people, the act becomes suspicious very quickly. Binoculars, video cameras and vision-enhancing devices also are used, depending on location and situation.

As defined by Techopedia;
Because of our data and identity driven society, personal security keys, like username and password combinations, are critical personal and private data safeguards. Unfortunately, technical savvy is not always required for hackers to gain information. The most commonly stolen data through shoulder surfing includes credit card numbers, personal identification numbers (PIN), important personal information (like middle name and birth date used in password recovery) and usernames/passwords. This type of information may be used to login to accounts and steal other information, such as money, in the case of bank accounts.

The following are simple ways to protect yourself from shoulder surfing when entering or accessing personal data on an electronic device:

Look for an area where your back is against a wall.
Spend more for a screen filter or protector to obscure the visibility of the display.
Never give your password or any vital information to anyone.
Locate a quiet spot away from the crowd.
As much as possible, never open personal accounts in public.

Please stay Safe