30 Nov 2018

Mobile security threats

mobile security threats
Mobile security threats include both physical and software-based threats that can compromise the data on smartphones, tablets and similar mobile devices. Like viruses and spyware that can infect your PC, there are a variety of security threats that can affect mobile devices.

27 Nov 2018

Sender Policy Framework (SPF)

Sender Policy Framework

Sender Policy Framework (SPF) is a method of fighting spam emails. SPF is designed to prevent forged or spoofed emails being sent by checking and validating that the sender is authorised to send email from the domain they're claiming to be from.

21 Nov 2018

Firefox Monitor will let you know if your online account was breached

firefox monitor

Data breaches are common for online services. Most people don’t know they have been affected by a data breach. This makes it difficult for affected people to secure their online accounts as they don’t know they’re insecure in the first place. This is why Firefox Monitor was launched to notify users when they visit a site that has been breached in the past.

19 Nov 2018

Tips to stay safe on social media

social media
With so many people using social media today, sites such as Twitter, Facebook, Google+, Instagram, Snapchat, LinkedIn etc have changed the way people use the Internet; allowing you to meet, interact, and share with people around the world. With all this comes risks to you, your family, friends etc and these sites make perfect targets for scams. How can you stay safe online?

29 Oct 2018

How to migrate other security vendor database to Check Point with SmartMove

checkpoint smartmove
Check Point SmartMove tool enables you to migrate to Check Point R80.10 and above in a fast & simple way by automatically converting 3rd party databases containing firewall, NAT, objects and policies to Check Point databases.

25 Sep 2018

How to use 3rd party SFP Transceivers / Modules on Cisco Routers and Switches

SFP Modules / Tranceivers
When you plug-in a 3rd party transceiver on Cisco Router or Switch, with terminal monitor on, you will see a log message indicating that the hardware platform has detected an invalid SFP like below:

24 May 2018

Telegram messenger security bots, channels and groups

telegram messenger
Telegram messenger is a free cloud-based mobile and desktop messaging app with a focus on security and speed. With Telegram, you can send messages, photos, videos and files of any type (doc, zip, mp3, etc.), as well as create Groups for up to 100,000 people or Channels for broadcasting to unlimited audiences. Telegram supports end-to-end encrypted voice calls. you can get more info about Telegram here.

6 May 2018

Twitter advises users to change password now

If you’re using Twitter you should change your password. Twitter has advised that more than 330 million users on its platform should change their passwords due to a bug. Twitter identified a bug that stored passwords unmasked (unscrambled, thus in clear/plain text) in an internal log.

25 Apr 2018

Microsoft launches Windows Defender Browser Protection extension for Google Chrome

Windows Defender Browser Protection
warning when you visit malicious website
Microsoft has recently released a new browser extension for google chrome; Windows Defender Browser Protection extension for Safeguarding chrome users from malicious websites, with real time protection from Microsoft. Windows Defender Browser Protection’s purpose is to analyse the links that you open and protect you against malware and malicious websites.

21 Jan 2018

MasterCard introduces cards with embedded fingerprint sensors

MasterCard has unveiled a payment card with a fingerprint sensor embedded. It's currently being tested in South Africa and hopes to be rolled out to the rest of the world by the end of 2017. This will depend on the results of additional trials in Europe and Asia Pacific, to be effected in the coming months.

9 Jan 2018

Tips for Safer Online Shopping

Online shopping has made it easier and convenient for consumers. However, most people are unaware of the dangers and risks that they may face while shopping online. This article is to highlight on what steps people should exercise to stay safe when shopping online. It's important to take steps to protect yourself when shopping online.

Locky ransomware spreading via Facebook Messenger

Ransomware is a sophisticated malware that infects your computer, encrypts files and denies victim access to his/her files until a ransom is paid within a stipulated time. Read information on what Ransomware is, how criminals infect your computer with Ransomware, and what you can do to stay safe. All that information is here.

6 Jan 2018

Microsoft’s Skype Serving malicious ads on windows

Users running Microsoft’s Skype VoIP client on Windows are being served malicious ads trying to push a fake Adobe Flash Player update that eventually leads to a malware infection.

Phishing campaign to steal PayPal users’ identity

There have been countless phishing attacks on PayPal users, but of late the attack has got sophisticated with emails that look real as well as the fake website. Recently phishing attacks were targeting Gmail users and they could fool even the IT pros.

How to create a strong password

Having a different strong password for each service is a must in today’s online world. With the hacking scandals in the news every other week, everyone should be concerned about the security of their online accounts. You can check my other post on tips to secure your password. Here is a techniques for creating strong passwords - and remembering them!

Password security tips

Passwords are the most common means of authentication and you need to choose good strong passwords which you keep confidential. Many systems and services have been successfully breached because of insecure and inadequate passwords.

5 Jan 2018

Social Engineering

Social engineering refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access.

Ransomware, what you need to know...

The Computers world out there has always a fight between good and the bad. While the good try to keep malware at bay, the bad are brewing something eviler than before. imagine waking up one day, powering up your laptop then you're greeted by a big red or dark image demanding payment within 48-hours or else everything on your computer will be erased.

Unified Threat Management (UTM)

Unified threat management commonly abbreviated as UTM is an approach to security management that provides the ability to monitor and manage a variety of security-related applications and infrastructure components through a single management console. Simply a single security solution.

Full List of Cisco Products Vulnerable to CIA Hack found in Wikileaks ‘Vault 7’ Docs

cisco switches
Below is a full list of Cisco products Vulnerable to CIA Hack found in Wikileaks ‘Vault 7’ Docs of secret C.I.A. hacking tools.

Hundreds of Cisco Switch Models Vulnerable to CIA Hack found in Wikileaks ‘Vault 7’ Docs

Cisco Systems said it has found a critical vulnerability affecting the IOS and IOS XE software inside hundreds of models of its switches. The vulnerability can allow an attacker to remotely gain full control or cause a reload of an affected device.

A-Z Computer Security Threats

Computer security threats are relentlessly inventive. These threats constantly evolve to find new ways to annoy, steal and harm. Arm yourself with information and resources to safeguard against computer security threats and stay safe online. You might be an IT professional, use a computer at work, or just browse the Internet. Which ever way you will need to be aware of the security threats to your computer and to your data.