21 Jan 2018

MasterCard introduces cards with embedded fingerprint sensors

MasterCard has unveiled a payment card with a fingerprint sensor embedded. It's currently being tested in South Africa and hopes to be rolled out to the rest of the world by the end of 2017. This will depend on the results of additional trials in Europe and Asia Pacific, to be effected in the coming months.

9 Jan 2018

Tips for Safer Online Shopping

Online shopping has made it easier and convenient for consumers. However, most people are unaware of the dangers and risks that they may face while shopping online. This article is to highlight on what steps people should exercise to stay safe when shopping online. It's important to take steps to protect yourself when shopping online.

Locky ransomware spreading via Facebook Messenger

Ransomware is a sophisticated malware that infects your computer, encrypts files and denies victim access to his/her files until a ransom is paid within a stipulated time. Read information on what Ransomware is, how criminals infect your computer with Ransomware, and what you can do to stay safe. All that information is here.

6 Jan 2018

Microsoft’s Skype Serving malicious ads on windows

Users running Microsoft’s Skype VoIP client on Windows are being served malicious ads trying to push a fake Adobe Flash Player update that eventually leads to a malware infection.

Phishing campaign to steal PayPal users’ identity

There have been countless phishing attacks on PayPal users, but of late the attack has got sophisticated with emails that look real as well as the fake website. Recently phishing attacks were targeting Gmail users and they could fool even the IT pros.

How to create a strong password

Having a different strong password for each service is a must in today’s online world. With the hacking scandals in the news every other week, everyone should be concerned about the security of their online accounts. You can check my other post on tips to secure your password. Here is a techniques for creating strong passwords - and remembering them!

Password security tips

Passwords are the most common means of authentication and you need to choose good strong passwords which you keep confidential. Many systems and services have been successfully breached because of insecure and inadequate passwords.

5 Jan 2018

Social Engineering

Social engineering refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access.

Ransomware, what you need to know...

The Computers world out there has always a fight between good and the bad. While the good try to keep malware at bay, the bad are brewing something eviler than before. imagine waking up one day, powering up your laptop then you're greeted by a big red or dark image demanding payment within 48-hours or else everything on your computer will be erased.

Unified Threat Management (UTM)

Unified threat management commonly abbreviated as UTM is an approach to security management that provides the ability to monitor and manage a variety of security-related applications and infrastructure components through a single management console. Simply a single security solution.

Full List of Cisco Products Vulnerable to CIA Hack found in Wikileaks ‘Vault 7’ Docs

cisco switches
Below is a full list of Cisco products Vulnerable to CIA Hack found in Wikileaks ‘Vault 7’ Docs of secret C.I.A. hacking tools.

Hundreds of Cisco Switch Models Vulnerable to CIA Hack found in Wikileaks ‘Vault 7’ Docs

Cisco Systems said it has found a critical vulnerability affecting the IOS and IOS XE software inside hundreds of models of its switches. The vulnerability can allow an attacker to remotely gain full control or cause a reload of an affected device.

A-Z Computer Security Threats

Computer security threats are relentlessly inventive. These threats constantly evolve to find new ways to annoy, steal and harm. Arm yourself with information and resources to safeguard against computer security threats and stay safe online. You might be an IT professional, use a computer at work, or just browse the Internet. Which ever way you will need to be aware of the security threats to your computer and to your data.