How to protect yourself from KRACK, the WiFi hack!
A weakness in the WiFi protocol places virtually all wireless-enabled devices at risk! WPA2, a WiFi security protocol found at the heart of most modern Wi-Fi devices, including computers, phones, and routers, has been broken, putting almost every wireless-enabled device at risk of attack. A solid advice for setting up a new wireless router or […]
How to protect yourself from Petya, the new Ransomware outbreak.
Introduction A new wave of ransomware attacks targeting organizations across the world has been reported June 27, 2017. Reports indicate around 2,000 attacked users so far. The ransomware Petya was first reported in Ukraine, where its government, banks, state power utility and Kiev’s airport and metro system all particularly badly affected. The food giant Mondelez, […]
The First Computer Virus
A computer virus is typically defined as a malware program that replicates itself by inserting copies or modified copies of itself into other computer programs, data files, or boot sectors of hard drives. When this replication is successful the affected area is said to be infected. The term computer virus is also used in a more broad […]
you can check the strength of your passwords using tools like this http://www.passwordmeter.com/
What is spyware
Spyware is a type of malicious software that is spread around on the internet. The term spyware is used to describe software that carries out certain behaviours or operations without obtaining user consent. Such behaviours include but are not limited to: advertising, personal information gathering, and even changing computer settings and configurations. Spyware can be […]
According to CBS news, the world’s most common password is 123456
What is data exfiltration?
Data exfiltration is formally defined as the unauthorised transfer of sensitive information from a target’s system or network by an attacker to another location. Data is always moving around in network this makes it very hard to detect an exfiltration attack which makes it all the more serious and devastating. Such a transfer of data […]
use 2 factor authentication to be safe when accessing your e-mails or social media accounts on untrusted or public computers
As computer processing power increases the security of traditional passwords decreases due to vulnerability to what is known as dictionary attacks or brute force attacks. These are attacks where an attacker computer puts together a set of passwords and tries them out until your account is compromised. To face this threat the concept of password […]
Avoid entering sensitive data like your credit card numbers or any other financial or sensitive information into any public computer.