S E C U R I T Y

Loading

What Are The Risks Of Bring Your Own Device (BYOD) Application In Terms Of Information Security?
What Are The Risks Of Bring Your Own Device (BYOD) Application In Terms Of Information Security?

This article considers the risks of “ Bring Your Device” method that enables using personal mobile devices in business life in terms of information security and the policies that should be followed by the companies. Additionally, solutions for risks that might emerge with BYOD method are considered and statistical information related to the companies that use this method are provided.   Today, mobile devices have continuously increasing usage area. From hospitals to medical applications and ordering in restaurants, mobile devices show differences in terms of information on the devices. Instead of using different devices in private…

Read More
Wordpress File Manager Plugin Vulnerability CVE-2020-25213
Wordpress File Manager Plugin Vulnerability CVE-2020-25213

A critical vulnerability was detected in WordPress's file management plugin, one of the most used content management systems. This vulnerability can lead to the complete hijacking of your website. Because it is possible to upload a harmful file to your website using this vulnerability. Attackers can take over all of your data using this malicious file. Some details of the vulnerability: Extension Name: File Manager Link of the plugin: https://wordpress.org/plugins/wp-file-manager/ Affected Version of Plugin: 6.0-6.8 Patched Versions: 6.9 CVE of Vulnerability: CVE-2020-25213 …

Read More
How to Protect From Cyber Attacks While Working From Home
How to Protect From Cyber Attacks While Working From Home

 During the pandemic, daily habits such as the workplaces, work conditions and work methods of the people around the world are changing. Various employers say their employees to choose for working from home or let them work from home. Companies such as Apple, Google and Microsoft stated that they will let their employees work remotely to help to prevent  COVID-19. The underlying idea is to keep people healthy and to help to prevent the spreading of the disease. But this also brings certain liabilities. If you decide to work remotely, you need to consider the…

Read More
Secure Software Development: SSDLC in Software Development
Secure Software Development: SSDLC in Software Development

As the developed software may be using in medical information systems, critical infrastructure systems and financial systems, it is essential to develop software securely. Increasing software security vulnerabilities reveals new approaches to developing secure software. In the software development process, security should not be adopted as the last thing to do; security should start as soon as the software development idea is formed and continue until the latest copy of the created software disappears.  If critical operations are performed, and critical data is stored in the use of the developed software, both the rate of…

Read More