Hacker

Safety Tips for Using USB Drives

When mankind was struggling with compact disks and floppy disks, the USB drive came into the digital world…

Best Practices for Enterprise IT Security

To boost brand image and increase productivity, more and more enterprise sectors are exploiting avenues such as cloud…

Why SMEs Need to get Serious about their IT Security?

What’s common between most small and medium enterprises? It is a false sense of IT security that they…

Obama’s Speech Spreads Malware

Have you recently received any news which goes, “Obama speech to urge ‘refocus’ on economy” via any unsolicited…

Got an Email Attachment? Pause, Think and Inquire

An email attachment is but the Pandora’s Box of the online world. You never know what might pop…

United We Infect! Vobfus and Beebone – Viral Friends Forever

If you are having a hard time with your best buddy, it’s time you took a lesson or…

Make Your Facebook Account Hackproof with these Few Tricks

Guess what’s the utopia for cyber crooks? Social networking sites; to be more specific, Facebook. Incidences of Facebook…

Whatsapp Hoax (fake) Messages Doing the Rounds Again

Today one of my colleagues received a message on WhatsApp that read: “Hello, I. Am riya director of…

Parental Control – Its Role and its Importance

Does your computer’s security software have Parental Control features in it? If no, then this blog will tell…

Watering Hole Attack – An Overview

Guess what would be a better way for a predator to stalk its prey, rather than chasing it?…