What You Ought to Know About a New Sophisticated Spyware

Nov 25, 14 What You Ought to Know About a New Sophisticated Spyware

Posted by in Security, Software, News

Virus and malware are the bane of anyone’s computing life. Apparently, these two are just the tip of an iceberg, so to speak. A highly advanced malware has been discovered that not only infects computers, but snoops around as well. It’s like a sophisticated drone wrapped with Ebola. Symantec, a cybersecurity company, has...

read more

A Portable Tracker to Ensure Your Kid’s Safety

With full workload and a dozen more errands to attend to, it’s almost impossible for most parents of today to physically keep an eye on their children 24/7. But perhaps the worrying ends here as new technologies have recently been popping to help address this dilemma. The Rise of Portable Trackers There are several portable...

read more

10 Must Attend Internet Security Events

Sep 05, 14 10 Must Attend Internet Security Events

Posted by in Personal Computing, Security, Events

Internet security is a major concern for every business these days. Of course, the bigger your company, the more computers and users you have. This invariably leads to more exposure. However, there are plenty of service providers out there to help you with everything from email security to keeping on top of the latest cyber-attack...

read more

Towelroot Geohot, the root port bypassing the lock on Samsung Knox Kitkat

Jun 16, 14 Towelroot Geohot, the root port bypassing the lock on Samsung Knox Kitkat

Posted by in Mobile, Security, Tablets

Those who watched the beginnings of the iPhone hacking scene and PlaySation 3 will not have forgotten the name Geohot, the brilliant hacker who has contributed significantly to jailbreak both platforms. After months, if not years, of silence back to talk to him about his new creation, this time on the Samsung devices with Android...

read more

How to avoid being a victim of cybercrimes

Apr 28, 14 How to avoid being a victim of cybercrimes

Posted by in Personal Computing, Security

Victims of cybercrime have lost their finances, their jobs and in some extreme cases, their identities. But there are strategies you can put in place to reduce the risk of being a cybercrime target. This article will outline some of the safe behaviors and sophisticated security tools such as http://www.yourdigitalfile.com/ that you...

read more

Could your home appliances get hacked?

Feb 12, 14 Could your home appliances get hacked?

Posted by in Security

As we steadily get more dependent on technology, using more devices in the home and in the work place there’s little wonder that cybercrime is on the increase. To protect ourselves against malicious cyber-attacks we aim to put the necessary precautions in place to defend against threats both in the home and at work. Best practice...

read more