Perfect Password vs. Weak Password

by Donals Anderson, November 29, 2017

Every account that we do in any site requires Password. The reason is to create a user authentication to access the account. Password can protect you from whoever that wants to compromise your account and with malicious intention for sure.   A hacker can attack your password in many ways … Continue reading

Less Than 50% of British Small Business Prepared for Cyber Attack

by Paul Davies, November 24, 2017

It’s bad news for many small businesses in the UK today as fraud experts CSID have stated that less than 50% of all small businesses are sufficiently protected against cybercrime. In their report they state that 52% of all small businesses in the UK do not have sufficient security in … Continue reading

How to protect yourself from malicious QR codes

How to protect yourself from malicious QR codes

by Donals Anderson, November 17, 2017

QR codes or Quick Response Codes are those small black and white squares like barcodes that we can see anywhere. It is usually found in a transitory media where a piece of information about the media is put in the QR codes. Listed here are some of the things where … Continue reading

Because of Your Basic Rights to Internet Freedom and Privacy

by ehadmin, March 25, 2016

Even if you’re not downloading torrents, you’re not making embarrassing Google searches, you’re not using public networks and you have no need to bypass the restrictions of your workplace, privacy is a basic right, as is the right to browse freely. Not only that, surveys show that most people agree … Continue reading

Filled under : Internet Security
Response: 1 Comment

Nasdaq Hacking Perpetrators Continue to be Rounded Up

by Paul Davies, September 19, 2015

After what is now considered to be the largest credit and debit card fraud in history, it seems the assailants involved in the October 2010 Nasdaq Inc hacking scandal have nowhere to hide. Following the arrest and incarceration of Albert Gonzalez in Miami, two other perpetrators have been identified this … Continue reading

Page 1 From 9