Cross-Platform Malware: A Growing Threat For Computers

21 November 2013

There is a new threat in town when it comes to malware; it attacks without prejudice and it’s got cross-platform power. The same strain of a particular malware and virus, if it has cross-platform ability, can hit multiple OS such as Windows, Mac and Linux etc., simultaneously. It is exceedingly harmful because it has the [...]

Simple Security Tips To Keep Your Devices Safe

Simple Security Tips To Keep Your Devices Safe

16 January 2015

To search the web anonymously, a VPN service is required which blocks the IP address along with other personal information as well. However if you want a search from being recorded in your web history, you need to make use of a different search service. Every search engine makes use of a unique combination of [...]

Read the full story

Posted in Computer MonitoringComments (0)

What Is Pretty Good Privacy?

What Is Pretty Good Privacy?

14 January 2015

PGP or Pretty Good Privacy is a program which is used to encrypt and decrypt emails on the internet along with authenticating messages with digital signs and encrypted stored files. While it was initially available as free-ware, it is now only available as a commercial version and isn’t very expensive. It was even used before [...]

Read the full story

Posted in UncategorizedComments (0)

Protecting Your Computer From Hackers And Viruses

Protecting Your Computer From Hackers And Viruses

12 January 2015

The best advice someone can give you is to protect your computer. Because of the importance of this topic, the following is some advice and guidelines taken from the official online website of the FBI which have been modified and/or quoted verbatim. The advice doesn’t only apply to computers but to other digital devices as [...]

Read the full story

Posted in Computer MonitoringComments (0)

Malware? There’s A Google Play App For That

Malware? There’s A Google Play App For That

09 January 2015

Google is once again under fire after a mobile adware firm was found to be spreading out its malware dressed as a Google Play App. 2014 is the year of innovation it seems. Malware, spyware and hackers keep getting better at keeping their tracks to themselves and finding access to a whole host of stuff [...]

Read the full story

Posted in Cell Phone TrackingComments (0)

A Necklace Fit For A Hacker

A Necklace Fit For A Hacker

07 January 2015

If you’re a techie and into jewelry then this is something that you might ask Santa to get you for Christmas. Apparently, you can now get your hands on a USB necklace that can hack yours or anyone else’s computer with supersonic efficiency. This Is Not A Bond Movie But it totally should be. It’s [...]

Read the full story

Posted in Computer MonitoringComments (0)

BYOD Galore: Is The Workspace Secure?

BYOD Galore: Is The Workspace Secure?

05 January 2015

BYOD has diversified over the last few years. It isn’t just about bringing to work a laptop or cell phone anymore, the story has gotten bigger and better for most part. Watches, glasses, belts and a whole lot more has hit the market offering to do things that no other watch, glasses or belt has [...]

Read the full story

Posted in Cell Phone Tracking, Computer MonitoringComments (0)

Security Enhancements For iPhones

Security Enhancements For iPhones

02 January 2015

Apple wants to provide advanced security options to its users by introducing the use of the combination of Touch ID and Fingertip motion. The function involves the circular motion of the fingertip to give certain commands for the sensor to detect and execute. Rotation or movement of the finger in particular ways would produce the [...]

Read the full story

Posted in UncategorizedComments (0)

Nokia Revises Strategy: Opens Security Hub In Berlin

Nokia Revises Strategy: Opens Security Hub In Berlin

31 December 2014

Nokia recently introduced its new centre of security in the German capital, Berlin. This was done in consideration for the changes made to the company’s strategy concerning mobile security.  This new, state of the art, security centre will include a startup space, an area for demos and various facilities for research. The major purpose of [...]

Read the full story

Posted in UncategorizedComments (0)

1 2 3 19