24 May 2018

Telegram messenger security bots, channels and groups

telegram messenger
Telegram messenger is a free cloud-based mobile and desktop messaging app with a focus on security and speed. With Telegram, you can send messages, photos, videos and files of any type (doc, zip, mp3, etc.), as well as create Groups for up to 100,000 people or Channels for broadcasting to unlimited audiences. Telegram supports end-to-end encrypted voice calls. you can get more info about Telegram here.

6 May 2018

Twitter advises users to change password now

twitter
If you’re using Twitter you should change your password. Twitter has advised that more than 330 million users on its platform should change their passwords due to a bug. Twitter identified a bug that stored passwords unmasked (unscrambled, thus in clear/plain text) in an internal log.

25 Apr 2018

Microsoft launches Windows Defender Browser Protection extension for Google Chrome


Windows Defender Browser Protection
warning when you visit malicious website
Microsoft has recently released a new browser extension for google chrome; Windows Defender Browser Protection extension for Safeguarding chrome users from malicious websites, with real time protection from Microsoft. Windows Defender Browser Protection’s purpose is to analyse the links that you open and protect you against malware and malicious websites.

21 Jan 2018

MasterCard introduces cards with embedded fingerprint sensors

MasterCard has unveiled a payment card with a fingerprint sensor embedded. It's currently being tested in South Africa and hopes to be rolled out to the rest of the world by the end of 2017. This will depend on the results of additional trials in Europe and Asia Pacific, to be effected in the coming months.

9 Jan 2018

Tips for Safer Online Shopping

Online shopping has made it easier and convenient for consumers. However, most people are unaware of the dangers and risks that they may face while shopping online. This article is to highlight on what steps people should exercise to stay safe when shopping online. It's important to take steps to protect yourself when shopping online.


Locky ransomware spreading via Facebook Messenger

Ransomware is a sophisticated malware that infects your computer, encrypts files and denies victim access to his/her files until a ransom is paid within a stipulated time. Read information on what Ransomware is, how criminals infect your computer with Ransomware, and what you can do to stay safe. All that information is here.

6 Jan 2018

Microsoft’s Skype Serving malicious ads on windows

Users running Microsoft’s Skype VoIP client on Windows are being served malicious ads trying to push a fake Adobe Flash Player update that eventually leads to a malware infection.

Phishing campaign to steal PayPal users’ identity

There have been countless phishing attacks on PayPal users, but of late the attack has got sophisticated with emails that look real as well as the fake website. Recently phishing attacks were targeting Gmail users and they could fool even the IT pros.

How to create a strong password

Having a different strong password for each service is a must in today’s online world. With the hacking scandals in the news every other week, everyone should be concerned about the security of their online accounts. You can check my other post on tips to secure your password. Here is a techniques for creating strong passwords - and remembering them!

Password security tips

Passwords are the most common means of authentication and you need to choose good strong passwords which you keep confidential. Many systems and services have been successfully breached because of insecure and inadequate passwords.

5 Jan 2018

Social Engineering


Social engineering refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access.
Wikipedia

Ransomware, what you need to know...

The Computers world out there has always a fight between good and the bad. While the good try to keep malware at bay, the bad are brewing something eviler than before. imagine waking up one day, powering up your laptop then you're greeted by a big red or dark image demanding payment within 48-hours or else everything on your computer will be erased.


Unified Threat Management (UTM)

Unified threat management commonly abbreviated as UTM is an approach to security management that provides the ability to monitor and manage a variety of security-related applications and infrastructure components through a single management console. Simply a single security solution.

Full List of Cisco Products Vulnerable to CIA Hack found in Wikileaks ‘Vault 7’ Docs

cisco switches
Below is a full list of Cisco products Vulnerable to CIA Hack found in Wikileaks ‘Vault 7’ Docs of secret C.I.A. hacking tools.

Hundreds of Cisco Switch Models Vulnerable to CIA Hack found in Wikileaks ‘Vault 7’ Docs

Cisco Systems said it has found a critical vulnerability affecting the IOS and IOS XE software inside hundreds of models of its switches. The vulnerability can allow an attacker to remotely gain full control or cause a reload of an affected device.

A-Z Computer Security Threats

Computer security threats are relentlessly inventive. These threats constantly evolve to find new ways to annoy, steal and harm. Arm yourself with information and resources to safeguard against computer security threats and stay safe online. You might be an IT professional, use a computer at work, or just browse the Internet. Which ever way you will need to be aware of the security threats to your computer and to your data.