Posts

Showing posts from August, 2019

eMMC vs SSD ?? What's the Difference. Check it Out.!! || tech talks group ||

Image
If you're shopping for a new laptop, there are a lot of factors to think about. One of the most important aspects to consider is the kind of storage a laptop offers. Your average laptop (whether it's a 2-in-1, big and expensive, or budget-friendly and compact) will most likely sport either eMMC storage or SSD storage, but how are they different? Keep reading to learn more about eMMC hard drives vs. SSD hard drives. What Is eMMC Storage and How Does It Work? eMMC (embedded MultiMediaCard) storage is a form of internal storage made up of a controller and NAND flash memory, both of which are located in one integrated circuit. eMMC storage chips are usually embedded in a given device's motherboard. The controllers housed within eMMC chips have the ability to put data into storage, which, according to SearchStorage, allows the device's CPU to conserve its already limited speed and power for other computing tasks. In addition, eMMC's use of NAND flash memory also r...

Security Bugs and Vulnerability - The Vulnerability Landscape

Image
Cyber security is an arms race between offensive and defensive capabilities, and unfortunately, we are losing this battle. As users, we want better technology doing cooler things enabling us to do more. But the more we have, the more we rely on it,  and the more complex these systems become. Complexity is the enemy of security. In fact, complexity is a nemesis of security, which is one of the main reasons why we’re losing this arms race. I’m going to get you up to speed on security bugs and vulnerabilities and how they affect your security. A security bug and a vulnerability are actually the same thing. So they’re synonyms for each other. So if I say security bug or vulnerability, it’s the same thing. And it’s an error. It’s an error written into software that creates a potential for a threat agent, such as a hacker, to exploit it. So an example might be the recent Heartbleed bug which you may have heard about because it was on mainstream news. This is a bug in something ...

Spyware, Adware, Scareware, Pups & Browser Hijacking || tech talks group ||

Image
Spyware have its main purpose is to gather information and send it back to the attacker, well, to spy. The attackers don’t generally want to cause damage directly, but want to compromise your privacy and anonymity based on some agenda they’ve got. Spyware is intelligence gathering malware. For example, a rootkit can also be a Trojan horse, someone could call spyware a virus. The point is just to understand the variants that exist and the possible purpose of the malware.  Adware , which some people consider it to be a form of spyware. Is undesirable software that forces advertisement on you. There are millions of different variants of this. One of the most annoying and destructive form of adware is called Cool Web Search. You may even have encountered it yourself, but there’s nothing cool about it at all. Know Your Enemy - The Current Threat and Vulnerability Landscape It hijacks your default search engine, it ...