There can be various reasons why hackers want to gain access to your account. Once they gain access to your Gmail account, hackers can use it for various purpose and they post aims to help you secure Gmail account so that you can regain access to your Gmail even if your account password get compromised. [Read more…]
What is ransomware?
Ransomware belongs to the family of malware used to take control of users’ machines and the users get back control of the machine when the victim pays a ransom to the attackers.
There are a number of preventive steps that a user can take to avoid ransomware attack. But before delving depth into the ransomware prevention technique, you need to know a bit about types of ransomware and how they spread.
How does ransomware spread?
Your computer may get infected with ransomware in several ways such as via email attachment, via compromised website, Trojan horses, by clicking pop up ads, etc. [Read more…]
Both children and adults are vulnerable to various types of cybercrimes. If you ever become a victim of such crime you may do a number of things, from reporting to the stop using online activities unless the threat is neutralized, in order to deal with the problem. The ways to deal with cybercrime has been given below: [Read more…]
Only a handful of research has been undertaken so far about the symptoms of Internet addiction. I have gathered a few major points that may give you a clear signal if someone is addicted to the Internet. You can use the following points as a reference to identify if you, your kids or anyone you care about have fallen victim to the Internet addiction. [Read more…]
If you are a parent, it is essential for you to be aware to the consequence of excessive using of computer playing games.This post aims to highlight a number of major issue that may cause harm to your kids if they play video games too long. [Read more…]
Interesting contents shared in the social media attracts everyone and that is one of the reasons of social media’s popularity. But if you want to stay safe online you need to know which information is not safe sharing on social media and on others websites, forums etc. The following are the list of things you should not share online via social networking websites or any other websites. [Read more…]
In today’s cyber security, landscape database is considered to be the most important asset of an organization, which holds sensitive information about the business and employees . Having installed and configured firewalls, IDS and end point security, one should not expect that the database is secure and there is no way anyone can breach data. Most of the major data breach incidents of the last few years indicates that despite having installed the state of the art firewalls and other security appliances, the database got breached. [Read more…]
OpenSSL is a free and open-source SSL solution that anyone can use for personal and commercial purpose. Though it is free, it can expire and you may need to renew it. This post will you how to renew self- signed certificate with OpenSSL tool in Linux server. [Read more…]
Not every developers pay equal importance to web security and vulnerabilities, especially about cross site scripting when they start coding. Their primary goal is to get the project finished Websites developed with unsecure coding can be easily exploited by the attackers. There is no way your browser will prevent XSS automatically unless you disable your browser’s ability to run scripting languages such as JAVA script. Or only visit the sites that you trust. [Read more…]
This post has been intended for the first time users who want to install GoDaddy SSL certificate in their website. The procedures described here should work well with Apache server and with Nginx.
Steps to take before installing GoDaddy SSL
To install a digital certificate, you must first generate and submit a Certificate Signing Request (CSR) to the Certification Authority (CA). The CSR contains your certificate-application information, including your public key. Use your Web server software to generate the CSR, which will also create your public/private key pair used for encrypting and decrypting secure transactions. [Read more…]
We use antivirus software in the hope of having a secure system. Though any virus detecting software can detect viruses, we need to know that there are instances when viruses and malware remain undetected. The post aims to give you a brief idea on the situation when your antivirus may fail to detect the presence of malware in your computer. [Read more…]
Though malware may take many forms, they have only one purpose to -disturb your computing environment. We can broadly classify malware depending on how the replicate and function. Remember that any codes that have evil intentions can be called a malware. That is why a virus, worm or even a backdoor program can be considered as a malware. But there is a distinct difference between a malware and an exploit that we will discuss in another post. [Read more…]
Just like the viruses, antivirus software is also very competitive. There are fierce battle among the premium antivirus makers such as Norton, Kaspersky, McAfee, Trend Micro system, Bit defender and a few more to increase their market share. People easily get caught up when they decide to buy a premium antivirus because they cannot differentiate between two vendors. Interestingly, some antivirus software is free, which confused the new customers even more. [Read more…]
What is Facebook virus?Facebook virus is just like any other virus that gets installed in a computer when a user clicks on a link shared from his friends’ news feeds or shares. So, the two most common ways that can infect your computer from Facebook viruses are: [Read more…]
This is a list of top 10 PHP secuirty tips that you can follow when developing your PHP based web applications.
Restrict access to administrative page
Most of the web based software have administrative page that is used to configure and to manage the software. When you install PHP based software, remember to change the script’s default directory name and also remove the installation script. Some software offer the option to installation script removal after completion of the installation process. [Read more…]
Though it is always possible to login in your server using username and password, but you always remain vulnerable to brute force attack. You will always feel that someone may break your password and get privileged access to your server. Are there any better ways to make your server access more secure? The answer is positive. You can make your server access more secure by generating SSH key pair. [Read more…]
Who wants to lose his sensitive and confidential data? The answer is everybody wants to avoid embarrassing situation and to keep his data safe. Fortunately, you can avoid losing your data by following a few tips. What you have to do it to remember the following tips by reading it 38 times. Yes you heard it right. [Read more…]
A study conducted by UK based charity Beatbullying showed that almost 73% of the people knew who was sending them bullying messages.
If you are a parent of a teenager, remember that cyberbullying is more common among teenagers and keep reading this post in order to get a few insights on protecting your kids from the cyber neurotics. [Read more…]
Web application security testing might seems intimidating and esoteric to many web administrator, especially to the new ones. Have you ever asked yourself why so many IT professionals ignore the security aspects of the applications? We seem to have a tendency to ignore things that is unperceivable. You become concern when something breaks or any security breach occurs in our IT systems. The truth is there a number of efficient and open source web security vulnerabilities analysis tools that you can easily earn and use to implement IT security best practices to your IT department.