Security

How to Establish a Cyber Security Action Plan for Your Business

May 5, 2017
Thumbnail image for How to Establish a Cyber Security Action Plan for Your Business

Cyber security is not an issue you can afford to ignore. Cyber attacks grow ever more sophisticated and hackers don’t sleep. A serious data breach is catastrophic for a company’s reputation, but with technology increasingly entwined in our everyday lives, businesses need a multi-faceted action plan if they want to minimize risks. There is no […]

Read the full article →

How Ransomware Uses Powershell

February 15, 2017

Fileless Attacks: The Evolution of Ransomware Ransomware continues to produce significant revenue for hackers as consumers and companies move toward complete digital storage — if access to personal documents or key corporate information is suddenly and completely restricted, it’s no surprise victims are willing to pay rather than risk complete data destruction. While hackers typically […]

Read the full article →

A Look at the Current Malware Preying on Surfers and How to Prepare

July 5, 2016
Thumbnail image for A Look at the Current Malware Preying on Surfers and How to Prepare

There was a time when average computer users were mostly concerned with sociopathic cyber threats that would erase data and cripple the operating system. Early computer viruses were mostly intended for cyber vandalism; however, the world of malicious software (malware) would eventually evolve into invasion of privacy, data theft, fraud, blackmail, and even extortion. According […]

Read the full article →

How to Protect Your Data When Shopping Online

May 7, 2015
Thumbnail image for How to Protect Your Data When Shopping Online

Shopping online has boomed over the last decade. On Black Friday, there is no need to put yourself through long lines and crowds of people to get the good deals anymore. You can find almost anything you are looking for online. However, as more online shops pop up, we continue to find an increase in […]

Read the full article →

DDoS Attacks: Yes, You Are Vulnerable — But You Can Protect Yourself

October 7, 2014
Thumbnail image for DDoS Attacks: Yes, You Are Vulnerable — But You Can Protect Yourself

It’s an average Tuesday afternoon, when suddenly you begin receiving phone calls from your customers asking why they cannot access your website. You try to check it yourself, and receive error messages indicating that the page is not available, or that the server is busy. Nothing else appears to be amiss — your server is […]

Read the full article →

5 Ways to Secure Your Android Device

June 5, 2014
Thumbnail image for 5 Ways to Secure Your Android Device

With the omnipresence of smartphones these days, it’s hard to believe less than 10 years ago the concept was almost unknown. Granted, there were PDAs and other devices around for some time before then, but Blackberry really didn’t start making a splash in the US market until almost 2006. The introduction of the iPhone in […]

Read the full article →

7 Tips to Boost Your Digital Security

October 31, 2013
Thumbnail image for 7 Tips to Boost Your Digital Security

The digital age has revolutionized our lives, but now that our homes are stuffed with internet-connected devices, the risk of compromising your online security is far greater. Just how safe are you—and how can you minimize your vulnerability when shopping online, paying your bills, or even checking your e-mail? Here are seven tips to improve […]

Read the full article →

Encrypt Sensitive Information Reliably

September 30, 2013
Thumbnail image for Encrypt Sensitive Information Reliably

Most of the small enterprises forget to secure their data whereas the top most organizations have their IT departments to secure the content with top quality software and hardware systems. The smaller enterprises do not wish to spend much on this and so depends on some standard consumer programs. These software programs seem to be […]

Read the full article →

Norton 360 Exclusive Features That Will Make You Smile

March 27, 2013
Thumbnail image for Norton 360 Exclusive Features That Will Make You Smile

Protecting your computer isn’t, and never should be, a game between you and the bad guys. You know, the ones that create the phishing emails and web sites, the spam, the spyware, the malware and the viruses. With the wrong software it can be just that: a game. But if you want to win permanently […]

Read the full article →

SPAM mails – where do they come from? I’ll tell ya!

March 19, 2013
Thumbnail image for SPAM mails – where do they come from? I’ll tell ya!

Research done by Giovane Cesar Moreira Moura from Twente University in Holland shows that it’s just a few bad ISP’s (Internet Service Providers) that is behind most of all the spam and scam e-mails that the rest of us is plastered with daily. He has looked into 42,000 ISP’s to find “the bad neighborhood” on […]

Read the full article →

Top 5 Ways to Improve your Internet Security

February 19, 2013
Thumbnail image for Top 5 Ways to Improve your Internet Security

With the Internet evolving continuously, it’s exponentially important to ensure our [tp lang=”en” only=”y”]online security[/tp][tp not_in=”en”]online security[/tp] is at its maximum. With viruses, identity theft and phishing scams all threatening our Internet experience, we need to ensure that our home network is fortified with online security software that can keep these nasties at bay. This is where […]

Read the full article →

Mobile Operating Systems – An Overview Of Security Features

December 9, 2012
Thumbnail image for Mobile Operating Systems – An Overview Of Security Features

Increasing use of cell phones has extended this industry and now a day more Smartphones are sold than PCs. Smartphones are playing an important role not in the personal life of people but in their corporate life too. According to a study, a person spends more time on his Smartphone as compared to internet browsing. […]

Read the full article →

Information Security in the Era of Google Wallet

November 26, 2012
Thumbnail image for Information Security in the Era of Google Wallet

Make sure your phone is secure, not a liability! About a decade ago, Microsoft let everyone know that the future of payment was using their phones and devices enabled with Bluetooth. While that never really happened, Google’s push for mobile payment seems to be much timelier and actually gaining traction. With popular phones using Google’s […]

Read the full article →

Advancements in Safe Technology

November 2, 2012
Thumbnail image for Advancements in Safe Technology

The first safe was invented by brothers Charles and Jeremiah Chubb in 1835. The purpose of their invention was, simply put, to create a box that was durable and secure enough to prevent a thief’s efforts to steal its contents. This invention was enhanced in 1886 when Henry Brown created a metal safe that would […]

Read the full article →

iPhone Spy App Increases in Popularity

October 18, 2012
Thumbnail image for iPhone Spy App Increases in Popularity

Millions of people use smartphones, and particularly the iPhone. In fact, the new iPhone was reported to have sold millions within just a couple of days. It’s a phone that can do a wide variety of things, leaving many people to long for the opportunity to monitor what someone is doing on the device. This […]

Read the full article →

Rooting Android Devices: Know the risks!

September 5, 2012
Thumbnail image for Rooting Android Devices: Know the risks!

So you’ve got that android phone that you always dreamed of! Unpacked it, charged it and loved it. Started downloading apps or games and everything seems rosy in this picture perfect world. But can you download every app? How about trying to install some custom themes? What if you aren’t that satisfied with the in-built […]

Read the full article →

Two Innovative Ways Which Will Hack Your PC

August 28, 2012
Thumbnail image for Two Innovative Ways Which Will Hack Your PC

More than 80 million people in America use E-mails to connect with a lot of people across the globe and another 100 million surf the web to find different information and interact with the web. Although the number of online user is so high, only a few are able to protect their computer from major […]

Read the full article →

Will you survive losing all your data (photos, docs etc.)?

August 27, 2012
Thumbnail image for Will you survive losing all your data (photos, docs etc.)?

The subject of this article is what I often ask people I know are not very computer/tech savvy, because often they have no clue about backup or they know it’s something that they “should be doing”, but they either don’t know how or just “haven’t gotten around to it yet”.In almost every single case the […]

Read the full article →

The Affordable DIY on Identify Theft

August 25, 2012
Thumbnail image for The Affordable DIY on Identify Theft

Identity theft is a natural outgrowth of the technological advancements society has made. Just as sure as people are able to manage their finances and make their purchases in ways completely unthinkable in the 1960s and 1970s, so too have the ways in which criminals have sought to steal from the public. Now, there are […]

Read the full article →

Startling LinkedIn Security Issues: How to Protect Your Business

August 23, 2012
Thumbnail image for Startling LinkedIn Security Issues: How to Protect Your Business

Mega professional social networking website LinkedIn is losing face due to a mass security breach that left 6.5 million user passwords splashed all over the Internet. After a Russian forum user claimed that he hacked LinkedIn and leaked passwords online, Twitter users confirmed that they discovered their encoded LinkedIn passwords online. This breach in security […]

Read the full article →

How to Protect your Data in 2012

August 6, 2012
Thumbnail image for How to Protect your Data in 2012

All around the world, data is constantly being created. Some of it is trivial, and its loss would not be too traumatic, but some data is so valuable that losing it could have disastrous consequences. Many businesses have suffered due to data loss, and some have had to cease operations altogether. It is not only […]

Read the full article →

Yahoo! Voices Hack Underscores Importance of Security

July 25, 2012
Thumbnail image for Yahoo! Voices Hack Underscores Importance of Security

Troubled Internet company Yahoo! has another problem to deal with. On Thursday, it confirmed that Yahoo! Voices had 450,000 user passwords and email addresses stolen from its database. Surprisingly, every password had been stored in plaintext or unencrypted, so that anyone could read them. And it wasn’t only email addresses that were compromised. Gmail, Hotmail, […]

Read the full article →

Bouncer for Google… timid echoes of the Bugle

July 18, 2012
Thumbnail image for Bouncer for Google… timid echoes of the Bugle

There is always a time in a security application’s life when the bouncer becomes the bounced. Yes, we are referring to the Google Bouncer, the initially appreciated Android app store gatekeeper, which seems to have hit its puberty a bit too hard. According to Google, the percentage of Android users who were infected by malware […]

Read the full article →

Android malware-apps: Doubled in just a month

July 12, 2012
Thumbnail image for Android malware-apps: Doubled in just a month

The amount of malware aimed toward Android devices continue to increase. Hundreds of thousands of Android devices are already infected with Malware from the official Android app store, known as “Google Play”, according to a study by Trend Micro (who happens to a maker of antivirus software, obviously…) Also according to “The H Security”, the […]

Read the full article →