Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want.But working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are... Read More
Recently I have received email from my bank/credit Card Company, eBay & pay pal saying that my account has possibly been compromised and I need to confirm my details and password in order to get continued access.Spam email now has a new and more frightening variant, it's called phishing and... Read More
Phishing is the act of some individual sending an email to a user in an attempt to scam the user to release personal information. Is it easy to determine if it's a scam? Sometimes ? but not always. I hope to give you enough examples and information to help you... Read More
Identity theft is one of the most common criminal acts in society today. Criminals will use your personal information such as banking accounts and passwords, to pretend that they are you. They may take out credit cards in your name, mortgages, or even worse. The internet has opened up a... Read More
We all get the odd virus now and then, but sometimes that one virus could cause so many problems. In this article I shall be going though just some of the problems that these virus software programs can do, and how to fix them.One of the worst type of virus... Read More
It seems that nowadays cybercriminals prefer cash to fun. That is why malicious programs of various kinds (viruses, worms, Trojan horses, etc.) are very often aimed at stealing valuable -- in a direct sense of this word -- private and financial information. When written, these programs are spread all over... Read More
The average computer is packed with hidden software that can secretly spy on online habits.The US net provider EarthLink said it uncovered an average of 28 spyware programs on each PC scanned during the first three months of the year.There are currently over 38,000 spyware and adware programs that are... Read More
May. 16th 2005 - MicroWorld has reported the discovery of Troj/Sober-Q, which is a mass mailing spamming internet Trojan for the Windows platform.Some of the spam emails sent by this Trojan takes to respectable German news outlets, such as Spiegel etc., as reported by MicroWorld, which contain articles on:1. "Necessasity... Read More
Threats we ordinary Web users face online leave us no choice but learn. Haven't you noticed how many new things you learned lately? We are much better informed about malicious programs than just a year ago.This section of our vocabularies grows rapidly: now we all know what a "keylogger" is,"worm"... Read More
Let us take the example of scrambling an egg. First, crack the shell, pour the contents into a bowl and beat the contents vigorously until you achieved the needed result - well, a scrambled egg. This action of mixing the molecules of the egg is encryption. Since the molecules are... Read More
![]() |
|
![]() |
|
![]() |
|
![]() |
|
|||||
|
|
|
If you know what is the 'Fishing' then it's very... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
A couple of years back, I paid my dues the... Read More
Many of us have run into an annoying and time-consuming... Read More
Security leaks can be a big problem for any site... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
You'd better learn news from media, not from emails, security... Read More
If spyware were a person and he set himself up... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
To blog or not to blog? Well, why not? Lots... Read More
Someone recently told me, "You would have to be a... Read More
No longer are viruses the only threat on the internet.... Read More
With the Internet entering our lives in such an explosive... Read More
As you know, this time the virus under the name... Read More
Spyware and adware are becoming major problems for online surfers... Read More
Huge number of spyware software applications are available in the... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
First I would like to stress I am condoning the... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
If you are a parent, as am I, I think... Read More
Computer security for most can be described in 2 words,... Read More
Is your data secure? Think again. Securing data is unlike... Read More
If you are a parent, you have probably wondered at... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Watching how the traditional media covers the latest virus or... Read More
Internet scams and frauds are on the rise! The quantity... Read More
We all know that it's dangerous to use the same... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
If you use the internet, you have probably been infected... Read More
Over the past few years as the internet has become... Read More
Over £5 billion pounds was spent on online shopping in... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
No longer are viruses the only threat on the internet.... Read More
The money being spent online is steadily growing. With billions... Read More
If you have used a Windows machine for a while,... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
This is the second in a series of articles highlighting... Read More
Huge number of spyware software applications are available in the... Read More
If you know what is the 'Fishing' then it's very... Read More
Identity theft is one of the most common criminal acts... Read More
Can you protect your computer from all possible viruses and... Read More
When we think of adware, what comes to mind are... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
They're out there. Individuals trying to make a quick buck... Read More
Someone recently told me, "You would have to be a... Read More
Identity Theft is one of the most serious problems facing... Read More
If you are wondering how to fight spyware for safe... Read More
History and BackgroundThe virus was one of the first ever... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
Imagine this ? you open up your email box and... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Over the past few years as the internet has become... Read More
Ok, ok, I know you've seen them. All those pop... Read More
Well, this is an article I never thought I would... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
If you constantly deal with bank or electronic accounts, it... Read More
If you use the internet, you have probably been infected... Read More
We all get the odd virus now and then, but... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
You are at your computer, checking out software on EBay.... Read More
Threats we ordinary Web users face online leave us no... Read More
Internet Security |