Skip to main content

Home/ ACSE Discussion/ Group items tagged security

Rss Feed Group items tagged

Doug Peterson

Cyber security by the numbers: Malware surges, spam declines in third quarter | ZDNet - 0 views

  •  
    McAfee and Cisco have released their detailed cybersecurity reports for the third quarter and there's good news and bad news. Malware surged in the quarter, but spam eased off a bit.
Doug Peterson

Facebook awarded over $360 million damages against spammer | Naked Security - 0 views

  •  
    Facebook's security team have reason to celebrate as they have claimed another scalp in the ongoing fight against spammers on the social network.
Doug Peterson

How Secure Is My Password? - 0 views

  •  
    Determine how long it would take a computer to hack your password
Doug Peterson

Web Security: Why You Should Always Use HTTPS - 0 views

  •  
    The next time you visit a cafe to sip coffee and surf on some free Wi-Fi, try an experiment: Log in to some of your usual sites. Then, with a smile, hand the keyboard over to a stranger. Now walk away for 20 minutes. Remember to pick up your laptop before you leave.
Doug Peterson

Researchers Discover How to Steal Credit Card Data Using Square - 1 views

  •  
    Researchers attending the Black Hat security conference on Thursday demonstrated two ways in which Square - a mobile gadget that enables Android, iPhone, iPad, and iPod touch users to accept credit card payments - can be hacked to steal credit card data, with very little technical hardware required and "no technical skills at all."
Doug Peterson

London Olympic Games to simulate cyber-attacks | Naked Security - 0 views

  •  
    The London 2012 Olympic Games will open in nine months time, and - away from the glories anticipated on the track and field - consideration is being made about how to defend the world's leading sporting event from cyber-attack.
Doug Peterson

Memories of the Michelangelo virus | Naked Security - 0 views

  •  
    "Because March 6th 1992 was day zero for the Great Michelangelo Virus Scare, the first and probably one of the biggest computer virus scares that the world has ever seen."
tech vedic

Make your passwords harder to crack - 0 views

  •  
    There's nothing you can do if hackers get into a database with your password in it, but you can still protect yourself for all the other worst-case scenarios involving hacking. First, don't make it easy on hackers by choosing a common password. Splashdata uses security breaches to gather 'most popular passwords' lists each year. The word 'password', number sequences, and other simplistic phrases or numbers fill the top spots. Also, don't use your name, a password related to another one you might have on a different site, or a login name. Instead, experts recommend using 15 characters, upper-case letters, better yet nonsensical words with special characters and numbers inside them. By-The Xpert Crew @ http://techvedic.com
tech vedic

BlackBerry Z10: Easier to use than Android with loads of features - 0 views

  •  
    BlackBerry Z10 is the touchscreen version which is very similar to the other smartphones available in the market. Display with 4.2inch screen gives a resolution of 1268 x 768 pixels i.e. 768 pixels per inch. The BlackBerry Z10 is easier to use than Android and more powerful, giving faster access to e-mails, tweets, facebook updates and messages. The Z10 has 16GB on inbuilt memory. Unlike the iPhone, the BlackBerry Z10 will allow user to extend the storage with microSD card slot. It sports a chip letting the phone act as a credit card at few payment terminals and share data wirelessly when tapped against some other phones. BlackBerry Z10 comes with handsome cameras with 8MP on back and 2MP on the front. The rear camera can record is a 1080p high definition camera while the front has 720p resolution. One more good thing about the BlackBerry Z10 is its battery life. The talk time is upto 10hrs on 3G. Upto 60 hours of audio playback and 11 hours of video playback. The BlackBerry messenger (BBM) in BlackBerry Z10 includes voice calling and video chatting and allows user to share its screen with another. Another distinguishing feature is the BlackBerry Balance which allows two personas on the same device still keeping the individual data secure. One can set Work mode and personal mode and can switch between them easily. The Time shift is a camera feature that lets you capture a group shot where everyone is smiling with their eyes wide open. BlackBerry Z10 introduces new browser which includes HTML5 support which has a reader mode. By-The Xpert Crew @ http://techvedic.com https://www.facebook.com/techvedicinc https://twitter.com/techvedicinc http://pinterest.com/techvedic1 http://techvedicinc.tumblr.com/
tech vedic

Wear a wristband that glows when you get texts, notifications on your smartphone - 0 views

  •  
    How about a wristband that glows when you get a text message or a phone call on your smartphone? EMBRACE+ is the new gadget in the market that will glow in various colors on your wrist. The wristband will be a wearable gadget made for your smart phone and will display specific colors to indicate depending on what kind of notification you have received on your phone. You do not have to even take the phone out of the pocket. As soon as you get the notification, the wristband will give a visual notification in a specific color and will let you differentiate between a tweet and text message. The wristband connects to your smartphone using Wi-Fi connection.The EMBRACE+ wristband features will includes indications for incoming calls, text messages, new emails, notifications from social networks like Facebook, Twitter, LinkedIn and will even give you low battery levels indications. It will have a special feature that will help secure your phone. It will give notification if the smartphone goes far away from the wristband. The release date of the EMBASE+ wristband is July 2013. By-The Xpert Crew @ http://techvedic.com https://www.facebook.com/techvedicinc https://twitter.com/techvedicinc http://pinterest.com/techvedic1 http://techvedicinc.tumblr.com/
tech vedic

Must-to-know tips for Windows 8 installation - 0 views

  •  
    Installing Windows 7, the operating system with the most share across the globe, is simple and easy. However, you must ascertain the system compatibility, built-in-features pertaining to performance, troubleshooting and security to get the optimum use of it. Here comes a Windows 7 tutorial from Techvedic, a leading tech support vendor to ease your job.
tech vedic

Computer security outlook: Online identity theft and juxtaposed security initiatives - 0 views

  •  
    E-commerce, gaming, and social networking sites are grabbing the maximum attention, where you knowingly, or sometimes even unknowingly submit your personal information. And, Internet perpetrators are taking advantage of the pervasive Internet, people's growing dependencies on the Web, and addiction thereof. Thus, what you share on the Web, and with whom you share is an area of concern.
tech vedic

Top 5 tips you must know to stay safe on social networking sites - 0 views

  •  
    Soaring mobile Internet penetration has given new success dimension to the social network usage. Facebook, has recently reviled that 488 million users regularly use Facebook mobile, and a leading digital media firm Socialnomics has admitted that 23 percent of Facebook's users check their account 5 or more times daily. But a sad news is that, taking clues of the popularity, Internet attackers have targeted 54% of Social Networking Customers, claimed Barracuda Networks, a web security company.
tech vedic

How to secure files from other users on external disks? - 0 views

  •  
    External hard-disk or USB drive attached to a system running on OSX is vulnerable, as it could be accessed through other user-profiles easily. Apart from that, if the network file sharing feature is enabled, the external storage device could be accessed by anyone having the authority to get logged into the network. Thus, no matter you encrypted the drive or particular files or not, any unauthorized user can access your data, steal records and make changes into that. What to do? Techvedic, being a leader in tech support, offers you practical and effective solution.
tech vedic

How to remove 'Yontoo' adware Trojan from OS X system? - 0 views

  •  
    Yontoo Trojan, detected by noted security company Dr. Web is blamed for tracking the browsing behaviors across a range of popular browsers like Safari, Chrome, and Firefox. It may pretend as a media player, download manager, or other plug-in, thereby directing you to some maliciously crafted Web sites disguised as sources for file sharing and movie trailers.
Doug Peterson

Keylogger poses as Facebook and Microsoft, steals login credentials | The Barracuda Lab... - 0 views

  •  
    Most computer users have a haunting fear that somehow malware will find a way to sneak onto their PCs  when they are not looking. The truth is that while this does sometimes happen, the most common types of malware rely on trickery to invade and infect your computer.
Doug Peterson

Phishing without a webpage - researcher reveals how a link *itself* can be malicious | ... - 0 views

  •  
    "A researcher at the University of Oslo in Norway says that page-less phishing and other untraceable attacks may be possible, using a tried and true internet communications standard: the uniform resource identifier, or URI."
‹ Previous 21 - 40 of 79 Next › Last »
Showing 20 items per page