What is Remote Desktop Protocol? The Remote Desktop Protocol (RDP) is a technical standard for using a desktop computer remotely. Remote desktop software can use several different protocols including Independent Computing Architecture (ICA), Virtual Network Computing (VNC), and RDP. RDP, the most commonly used protocol, was initially released by Microsoft and is available for most […]
Category: Application Security
PUPs
What are PUPs? Potentially unwanted programs (PUPs) are software programs that are often installed when other software is being installed on a computer. PUPs often serve as marketing tools and may modify browser settings to display advertisements; this form of PUP is referred to as adware. PUPs differ from other malicious programs such as worms […]
QR Code Security
What is QR Code Security? A quick response (QR) code is a type of barcode that stores information as a series of pixels in a borderless square-shaped grid to be read by a digital device. When a QR code graphic is positioned in front of the lens of a smartphone camera, the code is read […]
What are Productivity Tools? With so many productivity tools and applications available, employees are often keenly aware of alternative strategies for collaborating and getting work done. If employees feel that their cybersecurity practices and policies are creating obstacles and slowing them down, they are likely to look for ways around that by accessing other tools […]
What is Networked Medical Device Cybersecurity? The Internet of Things (IoT) is the interconnection and communication between internet-enabled physical devices. The growth of such devices has been explosive, as smart devices such as wearables, sensors, phones, cars, appliances, and household gadgets are becoming increasingly prevalent in more and more aspects of daily living. The proliferation […]
What is Cross-Site Request Forgery? Cross-site request forgery (CSRF) cyberattacks are common web application vulnerabilities that take advantage of the trust that a website has already granted a user and their browser by tricking the web browser into executing an unwanted action in an application that the user is already logged in to. CSRF cyberattacks […]
FinTech
What is FinTech? FinTech (financial technology) is a term broadly referring to software, mobile applications, and other technologies created to improve and automate traditional forms of finance for individuals and businesses. A FinTech company refers to any business that uses technology to modify, enhance, or automate financial services for businesses or consumers.1 Examples of FinTech […]
Parameter Tampering
What is Parameter Tampering? Parameter tampering is a type of web-based cyberattack where the parameters exchanged between client and server are manipulated in order to modify application data. Application data such as user credentials, permissions, and prices and quantities of products are often stored in cookies, hidden form fields, or URL Query Strings to increase […]
Data Silos
What are Data Silos? A data silo is a repository of information in a department or application that is inaccessible or not fully accessible by other departments or applications in an information system. An example of siloed data is an information system that has finance, administration, HR, and marketing departments storing their data in different […]
Bossware
What is Bossware? Bossware is software to be aware of, whether you have a boss, or the boss is you. Bossware is a term that encompasses any form of employee productivity or performance monitoring software. The pandemic saw a dramatic rise in remote work and a concurrent rise in the number of employers wanting assurances […]