Home » 2016 » December (Page 2)

How to Find if It is a scam site?

Many of you may not be so tech savvy and will not be aware of the scam that hackers and cybercriminals perform by trading on the vulnerabilities of a computer or mobile user.  Many users have complained that they had unpleasant experience while shopping online....

Read More »

Stegno Malvertising Campaign a New Threat to Watch Out for

When it comes to fraud, hackers have many options at their end. There’s phishing, where hacker posing as a genuine figure tries to trick victims into providing a sensitive data. There’s man-in-the-middle, where hackers capture traffic on a public or less secure Wi-Fi network. But...

Read More »

How to Negotiate With Ransomware Hackers?

Ransomware is malicious software that blocks your computer or alters the files stored in it. It then asks for a ransom to let restore the lost files or the data back in the system. What’s worse, file once encrypted by a ransomware cannot be decrypted...

Read More »

Computer Threats to watch out for in 2017

As the year 2016 is ending and all of us are eagerly waiting for 2017. As the New Year is arriving, new computer threats are also getting developed and it is the time to have a look on them. From extensive IoT attacks, to ransomware...

Read More »

Shopping People be careful of Risky Wi-Fi

As the days grow shorter and Christmas lights blink on houses lining the society, one thing is clear: the festive holidays are here.Once the festive season arrives, the season for family outings and gift exchanges also starts. It totally means spending hours at the mall,...

Read More »

How to protect yourself from DDos attack?

DDoS is short for Distributed Denial of Service. It is a type of DOS attack where a number of compromised systems, which are severely infected with a Trojan, are simply used to attack a single system leading to a Denial of Service attack. Victims of...

Read More »

How to Prevent Data Loss

There is no doubt that technology is a boon, but the curious concern is “who gets the most out of it”? Nowadays, it is an important task for every organization to deploy security measures to prevent data leakage and loss to have a secure circulation...

Read More »