The principles behind online backup and cloud storage services are quite simple. In most cases, in order to keep accurate and current copies of your information, a backup service will […]
Archive | SecurityRSS feed for this section
Without a personal VPN, hackers and data sniffers can tap into your connection on an unsecured public Wi-Fi Hotspot.
Most of you are not surprised to hear that malware attacks can hit any browser, Internet Explorer is not necessarily weaker than other browsers in the security camp, they just […]
Recent events in the area of Internet security have shown that big players can make a difference and shut down hackers or hacking sites. But on the other hand, hackers […]
The Rustock Botnet was taken down earlier this month. It had accounted for billions of spam e-mails daily. According to Symantec’s March 2011 MessageLabs Intelligence Report this is a big accomplishment […]
It’s fairly well known at this stage that high end smartphones like the iPhone, Android and Windows Mobile devices can all be hacked and have been, but surprisingly only 16% of all […]
Harckers, security researchers at the ToorCon security conference in San Diego showed how easy it can be to poke holes in hardware and software with the right combination of tools, […]
Sites like Facebook give rise to new forms of phishing. For example, scammers might hijack a Facebook account, then use it to lure that person’s friends into clicking a friendly […]
Making calls can alert others about where you are. Because many mobile phones now carry Apps, they can be subjects of malware, or spyware, getting information about you. Watch what […]
An attacker can decrypt cookies, view states, form authentication tickets, identify membership passwords, see user data, and anything else encrypted using the ASP.NET framework’s API. These issues are significant because […]
The WildList is used as the basis for in-the-wild virus testing and certification of anti-virus products by several working groups like ICSA, Secure Computing, and Virus Bulletin.
Choosing a secure password to use online is second only in difficulty to knowing if that password is really secure or not. I thought I’d share with you two tools […]
Subscribe & Connect
- What is Buffering and How to Prevent it
- Google’s Nexus 7 Poised to Tackle Tablet Wars
- The Samsung Galaxy Beam Smartphone Is on Its Way to the UK
- How The Web Is Changing Research
- Is Online Backup Secure?
- Using A Public Hotspot? You Really Should Use A VPN
- SEO TIP: Use Separate IP Addresses If You Interlink Your Sites