Hardware vulnerabilities are often introduced by hardware design flaws. RAM memory for example, is essentially capacitors installed very close to one another. It was discovered that, due to proximity, constant changes applied to one of these capacitors could influence neighbor capacitors. Based on that design flaw, an exploit called Rowhammer was created. By repeatedly rewriting memory in the same addresses, …
Read More »Cyber Security for beginners: Malware Types
Short for Malicious Software, malware is any code that can be used to steal data, bypass access controls, or cause harm to, or compromise a system. Below are a few common types of malwares: Spyware This malware is design to track and spy on the user. Spyware often includes activity trackers, keystroke collection, and data capture. In an attempt to …
Read More »Common insurance terminologies
Agent A licensed individual or organization authorized to sell and service insurance policies for an insurance company. Aggregate Limit The maximum dollar amount of coverage in force for a property damage policy or liability policy. This maximum amount can be figured on a per occurrence basis or as a general aggregate for the complete policy term. Agreed Value A method …
Read More »