Which kind of data breaches or risk can happen if there is no virtual/physical disk encryption

There is an Azure-based internal database server and is not public-facing. There is another front-end application. A specific user group can connect with a VPN. There is no encryption applied at the disk level. So what risk or specific ga… Continue reading Which kind of data breaches or risk can happen if there is no virtual/physical disk encryption

How can you locate the “owner/issuer? A new MDM.exe file was just downloaded a [closed]

For the second time, I’ve had MDMs installed on my devices, Windows, IOS iPads iPhones and Android phone. Both following extended hospital stay. The previous time, I was able to find the vendor name by searching files, (including root), an… Continue reading How can you locate the “owner/issuer? A new MDM.exe file was just downloaded a [closed]

As long as an Android device does not get rooted, is it safe to assume that the main phone app has not been modified?

From a forensics standpoint, is there any technical possibility that WITHOUT rooting the device the potential cybercriminal used a manipulated system phone app to have hidden functionalities like secret messaging, which he had modified via… Continue reading As long as an Android device does not get rooted, is it safe to assume that the main phone app has not been modified?

How to design a desktop application that has access to a database via LAN?

As part of a project for school I’ve been tasked with designing a secure application that should be able to upload and download files from a database. I have very little experience in the area of security so I’m unsure of where to start so… Continue reading How to design a desktop application that has access to a database via LAN?

How does a non technical user/beginner vet Android apps to ensure they are safe?

Background
I moved from ios to Android so now can’t rely on Apple doing some checks on the apps.
I was told that Google does some automated checks and if you buy/download apps from large organisations, a.k.a. Microsoft, then you should be … Continue reading How does a non technical user/beginner vet Android apps to ensure they are safe?