Top

Category: Blog

2016
15 Oct

Hackers are hijacking internet routers used in small to large businesses and homes to become a huge Botnet that they can use to launch Distributed Denial of Service (DDoS) attacks against targets from. The attacks were all coming from compromised routers[…]

9 Oct

PCI Certification

What is PCI DSS The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards formed in 2004 by Visa, MasterCard, Discover Financial Services, JCB International and American Express. Governed by the Payment Card Industry Security[…]

25 Sep

The question a wise security manager asks is, can it be done, outside of a James Bond or Mission Impossible scenario? Is it possible to hack a satellite? If you mean use the satellite for your own signals, the answer[…]

17 Sep

Five Questions to Ask When You’ve Been Compromised 1. Which systems and data were affected? 2. How did they do it? 3 . Who did this to us? 4. Is it really over? 5. Can it happen again? Modern security[…]

15 Sep

Anyone who has even the slightest amount of contact with the internet is familiar with the scenario: An email or actual piece of mail arrives from a company who apparently handles some part of your connected life. The letter calmly[…]

2 Jun

Learn How To Find out if Someone is Secretly using your PC: Secure your personal documents being illegally accessed by another person by checking all the logs and details of the activities that had been done on your PC using[…]

30 May

Learn How to Send Self-Destructing Emails To Your Friends In Gmail: What if we tell you that you can send a self-destructing email to your friends? That means the sent email will destroy itself after the receiver reads it. This is[…]

28 Mar

Security researchers have discovered a new data-stealing Trojan that makes special use of USB devices in order to spread itself and does not leave any trace of activity on the compromised systems. Dubbed USB Thief ( or Win32/PSW.Stealer.NAI), the malware[…]

28 Mar

If you receive a mail masquerading as a company’s invoice and containing a Microsoft Word file, think twice before clicking on it. Doing so could cripple your system and could lead to a catastrophic destruction. Hackers are believed to be[…]

7 Mar

The sample is in virus total: https://www.virustotal.com/ And it is having low detection ratio due to the native form as Java compiled binary and the key strings used for scanning was encrypted.Open the JAR file with any kind of decompiler[…]

Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

What are cookies?

Cookies are small pieces of text stored on your computer when you visit almost any website. Companies use them to:

  • Verify your identity, to ensure your security and privacy
  • Determine the browser and settings you are using to provide optimised content
  • Understand the way you navigate through websites, so firms can make improvements
  • Help site owners and third-party advertisers tailor content to your preferences

We also use social media buttons and/or plugins on this site that allow you to connect with your social network in various ways. For these to work the following social media sites including;

    • Linked In
    • Twitter
    • YouTube

will set cookies through our site, which may be used to enhance your profile on their site or contribute to the data they hold for various purposes outlined in their respective privacy policies.

GOOGLE CHROME
There are multiple levels of cookie enablement in Chrome. For more information, click here.

INTERNETEXPLORE
There are multiple levels of cookie enablement in Internet Explorer. For more information, click here.

MICROSOFT EDGE
There are multiple levels of cookie enablement in Edge. For more information, click here.

MOZILLA FIREFOX
There are multiple levels of cookie enablement in Firefox. For more informaiton, click here.

OPERA
There are multiple levels of cookie enablement in Opera. For more information, click here

SAFARI
For more information, see the Safari user guide.