AVG has once again upset its customer base and proven that it lacks due diligence and competence needed in an antivirus company to stay afloat in the security business. Just few weeks before the New Year, a research team from…
Online attacks on big brand businesses have become a norm in the news headlines in the recent years. If we look at statistics, 1 out of 5 small businesses in the US fall prey to cybercrime each year and a…
For many Windows 10 users, the new operating system (OS) is becoming a source to exercise their patience. That’s because the new OS has some major flaws that flusters their work flow and drains productivity. A vast majority of people…
The relationship of computers with malwares is somewhat like Yin and Yang; they have contributed to each other’s development to this day, and inadvertently give business to one another. The existence of malwares is considered more bad then good, but…
In 2011, a hacking group calling themselves Lizard Squad intruded Sony’s servers and brought down it’s popular gaming network, the PlayStation (PSN). The hackers reportedly stole personal data of over 75 million accounts, which, when expressed in financial terms, turned…
Halloween is around the corner – the festival that is known to be associated with overcoming fear through fun, frolic, and not to mention festival shopping. Halloween is first among the series of winter holidays that draw closer to Christmas…
Last week, the UK called on gamers all across the country to participate in a one-of-its-kind challenge that could land many of them on lucrative job offers. The government-backed contest is called “Cyber Security Challenge UK,” touted to recruit the…
Cyberspace is a murky ground; it is rife with frauds and phishing agents who try to dupe you in disguise. But it gets even worse when the companies that proclaim to defend you again the evils of viruses, malwares, and…
In today’s digital ecosystem, threats must be secured at all endpoints, before they have the chance to execute and wreak havoc on your network. However, human intervention is mandatory in managing vulnerabilities. Perimeter defense was once a valid method…
When it comes to computer threats, we tend to think of the word “virus” as an all-inclusive term, but in reality, a virus is just one type of malware. There are many varities. Cyber criminals are always developing stealthy ways…