Blog

Password

 May 24, 2014

Estimated reading time: 2 minutes

In massive security news this last week, eBay was hacked on a large scale. This is the dominant story emanating from IT circles in the week gone by, and all else pales in comparison. During the hack, large databases of user passwords were also stolen and this is a rather...
 May 10, 2014

Estimated reading time: 3 minutes

There is no such thing as a slow news day, as every week is filled with stories of hacked websites, stolen passwords, new variants of Android malware and other security updates. The computer and mobile security industry never sits still, and this week we have yet more reasons for you...
 April 25, 2014

Estimated reading time: 2 minutes

Last week we wrote a blog about Heartbleed, the latest security bug that turned up around the world and caused global mayhem. The bug targeted the SSL encryption of web services that used OpenSSL, and this meant pretty much every major web service was affected. Moreover, security researchers subsequently found...
 April 14, 2014

Estimated reading time: 3 minutes

Password leaks and targeted attacks are nothing new and the latest security bug related to a massive loss of passwords across the world is ‘Heartbleed’. This bug has received a lot of media coverage over the last few days, so there is a lot of confusion about what it is...
 April 12, 2014

Estimated reading time: 3 minutes

There has been a severe password outage this week thanks to the already famous ‘Heartbleed’ breakdown. Millions of passwords, credit card numbers and other sensitive data have been revealed so it is strongly advised that you change all your passwords immediately. Other security news updates pale in comparison to this...
 March 15, 2014

Estimated reading time: 3 minutes

With the second week of March wrapping up, a new hoax is doing the rounds in Facebook. And this time, it is about the unfortunate incident of the missing Malaysian Airline MH370. Scroll on to read more about this and other news about IT security. Malicious spam videos claiming to...
  • 1
    Share
 March 4, 2014

Estimated reading time: 3 minutes

Avoiding and preventing malware on a computer is far simpler than removing it from an infected machine. Nevertheless, once a machine has been infected with malware, it is imperative to remove it immediately. Clear signs like lowered speed, popups, disabled functionality and more, indicate the presence of malware on a...
 January 25, 2014

Estimated reading time: 2 minutes

The first month of 2014 is almost nearing its end, and cyber criminals have already filled their plate with nefarious plans and illegal practices. Let’s see what this week witnessed in the world of IT security. Snapchat, Ouch! After the much hoo-haa about how 4.6 million Snapchat accounts were compromised,...
 January 21, 2014

Estimated reading time: 2 minutes

Yes, you read it right! “123456” has been labelled as the most commonly used and obviously the worst password of 2013. SplashData, a California-based company, comes up with an annual list of the 25 most common passwords used by people online. The list for the year 2013 was topped by...
 November 16, 2013

Estimated reading time: 2 minutes

Businesses Should Gear up for Worse Cyber Attacks in 2014 Cyber predictions for the coming year may not be pleasant for businesses. Security analysts are predicting that 2014 will see nastier cyber attacks on enterprises. Malware artists may use more of targeted attacks. Incidences of data breach may increase and...