Facebook iconTwitter icon
Latest Articles
Malware Attack on Facebook Users through Google Chrome
Iot header

Malware attacks on Facebook are not uncommon, especially given the popularity of the site. The current attack is on Facebook users using Google Chrome. What happens is that a Facebook user is scammed into downloading the malware through a notification. The comment tagging feature of the social site is what acts as a carrier for the malware. A user gets a notification of a comment tag from a “friend” in their email or on the app and when the link is clicked, the malware downloads. If a user goes as far as to click the downloaded link, the malware infects the device. The problem...

» Read more
Cerber Ransomware - Holding Your Personal Files To Ransom

Stories about Cerber Ransomware have been cropping up all over the internet, and for good reason. This is a piece of ransomware developed to hold personal files at ransom and even has the capability to create fake system alerts and speak in a robotic voice to its victims. The Cerber Ransomware is capable of encrypting personal files, such as photos, documents and other private information. Once files have been encrypted, the ransomware will speak to those that fall victim to it, stating that their files have been encrypted. 

The Ransom
Those who fall victim to this scam will then be...

» Read more
The benefits of eScan antivirus software
Untitled 1

If you want to save your computer from viruses, an active anti-virus software is essential. A tried-and-tested anti-virus that offers a good balance of features and performance is eScan. This software has proven to be effective in detecting and removing malware, spyware, and many other viruses. 

When experts recently tested eScan, they found that it did well against widespread spyware and had no false detections. AV-Comparatives awarded this program for its excellent performance in detecting malicious files. 

Most anti-virus programs use firewall to stop network attacks,...

» Read more
Building Bridges between Learners and Tech Superstars
Open uri20150421 475075 18extmq

The Internet of Everything (IoE) is a concept that has catalysed some potent techniques for carrying the internet of things into the lifes of all communities across the world. ModKit is among the most exciting developments of the movement. It’s designed to open up the world of programming to learners who are either young or young at heart. With a what-you-see-is-what-you-get interface, you simply need to drag and drop objects in order to create microcontrollers and real world devices.

Because the language is event-based, users can learn to code intuitively, picking up the syntax...

» Read more
Android Apps May No Longer Require Passwords
Smartphone header

This June, Google's Project Abacus, which was launched at a conference last year, is expected to see real-world tests. Last week, Dan Kaufman, Google's director of Advanced Technology and Projects group, announced that several major financial organisations are involved in the trial, and will start testing a Trust Application Programme Interface (API) that offers an alternative to passwords, using machine intelligence for user authentication purposes. The outcome of the forthcoming test could mean that the Trust API will become widely available by this December. 


» Read more
Advanced Network Security Measures with AlienVault
Untitled 1

Network security is an element that businesses and organisations take very seriously. A lot of operations and communications go through different networks and it is necessary to ensure that the right protection is available. AlienVault caters to this need by providing companies with threat detection products. With so many threats out there, it has become necessary to undertake stricter network protection measures. 

What it Offers
AlienVault’s USM (Unified Security Management) platform offers more advanced features than a typical, SIEM device. Any IT professional that wants to...

» Read more
The Brave New World of Biometric Eye-Scans

As we hurtle forward through the second decade of the 21st century, technology is advancing at an ever increasing rate. Technology that was once thought the preserve of sci-fi movies is now set the become reality, and there are few examples more pertinent in this regard than biometric eye-scanning.

Since John Daugman patented his iris-recognition algorithm in 1991, the writing has been on the wall: the practical application of these scans, after all, has always been blatantly evident. While many of us regarded the introduction and widespread use of such biometric systems as inevitable,...

» Read more
The Return of the Malicious Attachment
Open uri20150421 486776 1ielvw

Malicious attachment is malware embedded into often innocuous looking email attachments. When the user clicks and opens the attachment, the malware downloads into the system and wrecks it.

The low costs it takes to blast emails, the ability of attachments to evade signature and reputation based filters, and their resilience, not being dependent on vulnerabilities in the operating system or code, make malicious attachments the favourite of cyber criminals. They are cross-platform as well.

The spate of high profile botnet takedowns, and improved email filtering capabilities that saw an...

» Read more
Simply Clueless: Most People Aren't Afraid of Ransomware
Viren header

In a recent survey covering 3,000 computer users in USA and Canada, up to 85% of people said they weren't afraid of ransomware. Specifically they pointed out their refusal to pay a ransom, should they ever find their computer has been hi-jacked by ransomware. This is good! There are legitimate ways to get rid of this problem without endorsing the criminals behind it. However…

As many as 70% of the interviewed users admitted they don't actually know what is ransomware. This is not so good, since it suggests most users simply aren't afraid of this potential issue due to...

» Read more
Bayometric Touch N Go

Fingerprint Recognition API for Software Developers is Easy with Touch N Go

Bayometric Touch N Go is a fingerprint recognition API for apps. Interested business customers can request a demo from the Bayometric website and deal direct with engineers to access further information about the product. If you're planning the purchase of fingerprint scanners for any business operations, this could be a reliable API which provides everything needed at a budget price. 

Software developers looking to add biometrics to web portals or applications will find it's a simple matter to use...

» Read more

<< Older posts