The relationship of computers with malwares is somewhat like Yin and Yang; they have contributed to each other’s development to this day, and inadvertently give business to one another. The existence of malwares is considered more bad then good, but…
In 2011, a hacking group calling themselves Lizard Squad intruded Sony’s servers and brought down it’s popular gaming network, the PlayStation (PSN). The hackers reportedly stole personal data of over 75 million accounts, which, when expressed in financial terms, turned…
Halloween is around the corner – the festival that is known to be associated with overcoming fear through fun, frolic, and not to mention festival shopping. Halloween is first among the series of winter holidays that draw closer to Christmas…
Last week, the UK called on gamers all across the country to participate in a one-of-its-kind challenge that could land many of them on lucrative job offers. The government-backed contest is called “Cyber Security Challenge UK,” touted to recruit the…
Cyberspace is a murky ground; it is rife with frauds and phishing agents who try to dupe you in disguise. But it gets even worse when the companies that proclaim to defend you again the evils of viruses, malwares, and…
In today’s digital ecosystem, threats must be secured at all endpoints, before they have the chance to execute and wreak havoc on your network. However, human intervention is mandatory in managing vulnerabilities. Perimeter defense was once a valid method…
When it comes to computer threats, we tend to think of the word “virus” as an all-inclusive term, but in reality, a virus is just one type of malware. There are many varities. Cyber criminals are always developing stealthy ways…
Introduction Viruses attack your operating system in different ways, and all operating systems are vulnerable, including Windows and Android. While the early concern of infection was limited to desktop computers, recent malware alerts for Android mobile devices are growing harder…
What is a Graphics Card Any videos, images or pictures that you see on your computer screen are managed by certain graphic components. Such graphic components are aligned in a different card, which is plugged into a specific provision on…
A multinational coalition of organisations led by Europol’s European Cybercrime Center (EC3) has working successfully to disrupt the Ramnit malware family. Ramnit is a Computer worm that affects Windows users. Ramnit was first detected in 2010, attaching itself to executable…