Category Archives: Cyber Security

Critical alert: Wannacry or WannaCrypt ransomware

From the media reports and many blogs writing it has been reported that the critical ransomware namely wannacry or wannacrypt is fast spreading to millions of computers far and wide. It installs into a windows computer and then it automatically encrypts files of that operating system and then disallow the original user to open it Continue Reading »

Security Vulnerabilities of Mobile Devices

Mobile devices are common. It now completely integrates with laptop, televisions and other smart digital assistants. With the advent of mobile operating system such as android, there is every possibility of the creation of mobile computing environments. Most people are used for personal, professional or smart office and home office environments. There has been consciousness Continue Reading »

How to Fix a Malware Infected Computer

Even with a new computer there are no guarantees that it should be completely malware free. Most of original equipment manufacturers (OEMs) ship computers with some of crapware that could slow down a windows system. First and foremost the single important task you should be doing is to ensure that all such traces of malwares Continue Reading »

Tips to protect against On line Fraud and Phishing Variations

For safer online transactions the first thing we have to learn is that to be suspicious of anything that comes to your inbox. Sometimes, we check the Spam mails and suddenly there could have been any mail containing which demands sharing of information about your bank accounts, and even passwords and other financial transactions indications. Continue Reading »

How to secure operating systems?

There are various security measures which could protect vulnerabilities of operating system to a considerable extent. The preliminary level of investigation should have been involving the performances in low tech levels such as securing passwords and make it more consistent and better so that it should be harder to crack. You should be performing various Continue Reading »

Putting security testing in motion

While considering different aspects dealing with ethical hacking into system, we do confront with many facets of testing own security system and in this segment the special emphasis is to find out the loopholes and then fill those with security patches. When we venture into an alien system of the three aspects that come into Continue Reading »

1 2 3 4 5 6