The principles behind online backup and cloud storage services are quite simple. In most cases, in order to keep accurate and current copies of your information, a backup service will most likely provide you with a piece of software to install on your computer.
Archive | SecurityRSS feed for this section
Without a personal VPN, hackers and data sniffers can tap into your connection on an unsecured public Wi-Fi Hotspot.
Most of you are not surprised to hear that malware attacks can hit any browser, Internet Explorer is not necessarily weaker than other browsers in the security camp, they just [...]
Recent events in the area of Internet security have shown that big players can make a difference and shut down hackers or hacking sites. But on the other hand, hackers [...]
The Rustock Botnet was taken down earlier this month. It had accounted for billions of spam e-mails daily. According to Symantec’s March 2011 MessageLabs Intelligence Report this is a big accomplishment [...]
It’s fairly well known at this stage that high end smartphones like the iPhone, Android and Windows Mobile devices can all be hacked and have been, but surprisingly only 16% of all [...]
Harckers, security researchers at the ToorCon security conference in San Diego showed how easy it can be to poke holes in hardware and software with the right combination of tools, [...]
Sites like Facebook give rise to new forms of phishing. For example, scammers might hijack a Facebook account, then use it to lure that person’s friends into clicking a friendly link but is not and going to spam sites, or even giving up their Facebook login information.
Making calls can alert others about where you are. Because many mobile phones now carry Apps, they can be subjects of malware, or spyware, getting information about you. Watch what you say, and what you download.
An attacker can decrypt cookies, view states, form authentication tickets, identify membership passwords, see user data, and anything else encrypted using the ASP.NET framework’s API. These issues are significant because the vulnerabilities exploited affect the .NET framework, which is used by 25 percent of Web sites on the Internet.
The WildList is used as the basis for in-the-wild virus testing and certification of anti-virus products by several working groups like ICSA, Secure Computing, and Virus Bulletin.
Choosing a secure password to use online is second only in difficulty to knowing if that password is really secure or not. I thought I’d share with you two tools [...]
Subscribe & Connect
- What is Buffering and How to Prevent it
- Google’s Nexus 7 Poised to Tackle Tablet Wars
- The Samsung Galaxy Beam Smartphone Is on Its Way to the UK
- How The Web Is Changing Research
- Is Online Backup Secure?
- Using A Public Hotspot? You Really Should Use A VPN
- SEO TIP: Use Separate IP Addresses If You Interlink Your Sites