website statistics
In wake of a number of security breaches which have comprised data of lots of people, it is pertinent that a new method be devised to improve cyber security.

What new Apple device you are getting?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)

Digital security is becoming an increasingly greater problem with billions of users hooked to the internet now. Every other day, we hear of some serious sort of security loophole which ends up compromising the data of individuals and organizations. This now, for instance, it was a writer for Wires, Mat Honan, who was a victim of a cyber attack from hackers.

The attack ended up causing a lot of damage to Honan. The hackers first fooled Apple representatives and into believing they were the actual users and then had them reset the password on Honan’s iCloud. Once this was done, they were then able to access all linked social media accounts. This included not only Honan’s accounts but also Gizmodo’s Twitter account.

This, and other similar instances like this, makes it appear that breaking into one’s account and stealing one’s data is becoming increasingly easy for the hackers. But some very interesting suggestions are floating on the web as to how to ramp up digital security.

One basic suggestion is to couple actual digital security, for instance passwords etc, with biometric security. This can be done by adding the requirement of gathering, say, finger prints of the user every time he wishes to log in. But that of course requires special hardware and may also prove cumbersome for the users.

Another way to accomplish better security is, as suggested by Dr. Jakobsson, to make use of ‘Visual Preferences.’ Other touted names for the technique are ‘Mental metrics.’ The basis of this technique is that when given a mixture of pictures, a person would like some of them and dislike others, based on his mental facilities and experiences.

These picture preferences can be recorded by the system and user can later be asked about them to confirm his being. According to Dr. Jakobsson, not anyone apart from a person’s family may be able to guess precisely at these preferences and even they can’t deduce it exactly.

This may sound new and extra-ordinary but the fact is that it is already being used in a number of companies. And many others firms have plans of implementing this soon. So it is perhaps high time that social media sites such as Facebook and Twitter also jumped this bandwagon to improve the security of their users.

Source: ZDNet

Buy Cheapest Related Product From

Nikon To Adopt Android For Its Camera S800

Exogear Brings World’s First Stackable Battery Pack
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On August 10, 2012(3 years, 1 month ago.)

You May Also Like:

Recent Products

Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  

What Do You Think?

Loading Facebook Comments ...

FTC Disclosure: Some of the links of this website are "affiliate links." This means if you click on the link and purchase the item, we will receive an affiliate commission.

Recent Search

Recent Tutorials

Now you can set custom ringtones to individual skype contacts on android. It's easy to setup. Take a look.
Now you can install Microsoft's Cortana on Android devices. It's pretty easy to install. Follow the steps below, check the screenshot.
Want to install Android lollipop 5.0.2 on pc? This post is for you. It's pretty easy to install and run. Just take a look.
With our partnership with Mode Media, we just got a jump start. Here is our first story of hand picked curated content on Android Tutorials.
Want to change theme on android ? We will show you how to change theme on android. It will makes your phone looks like new and smart.
You can record your screen on android very easily. No root Required. All you have to need a pc and USB cable. Let's find out.
A simple tutorial on how-to block a phone number on Android device, without an external app. Its pretty easy and straight-forward. Take a look.
Here we will show how to take Screenshot on your Apple Watch.
For too many people, the realization that they need to back up their photos and videos only comes when they misplace or break their smartphones and lose everything. Here we a report on possible solution and best tools.
Not sure if you are aware that your Wi-Fi Router Or Modem could be hacked too. Here we found a quick tips, how to check if your Router or Modem is hacked.
Close You Have To Login
Login With »Login With TwitterLogin With Facebook