Posts under Security category

DLL Hijacking

DLL Hijacking Vulnerability Attacks, Prevention & Detection

DLL stands for Dynamic Link Libraries and are external parts of applications that run on Windows or any other operating systems. Most applications are not complete in themselves and store code in different files. If there is need for the […]

Eset Superfish cleaner

ESET Standalone Superfish Adware Cleaner available

ESET Security has released a free standalone Superfish adware removal tool for Windows users. If you recollect, Superfish was recently in the news, after it was found that this adware came pre-installed on Lenovo laptops. ESET Superfish Cleaner Tool The Superfish […]

Brute Force Attacks

Brute Force Attacks – Definition and Prevention

There are many methods hackers use to get into a computer, computer network, a website or an online service. Carrying out a Brute Force Attack is one of them. It is one of the simplest, yet time consuming method to hack […]

Intrusion Detection and Prevention software

3 Free Intrusion Detection and Prevention software for Windows

Cyber criminals are working hard these days to gain access to your business and home networks and it therefore becomes imperative that you take all possible steps to secure your Windows system. If you have an Intrusion Detection Software (IDS) […]

zero-day-attack

What does Zero Day attack, vulnerability or exploit mean

We often hear of Zero Day attacks, vulnerabilities or exploits. We have also heard of Zero Day patches. This article helps you know what is a Zero Day attack, exploit, or vulnerability. Zero Day attacks generally refer to attacks on […]

DNS Cache Poisoning and Spoofing

DNS Cache Poisoning and Spoofing

DNS stands for Domain Name System and this helps a browser in figuring out the IP address of a website, so that it can load it on your computer. DNS cache is a file on your or your ISP’s computer, […]

Online Safety Tips for Kids, Students and Teens

Online Safety Tips for Kids, Students and Teens

If a computer is not connected to Internet, it is not considered usable by many. What started as a small networking protocol has got everyone addicted to the Internet. With the increase in social networking sites, more and more people […]

famely safety settings Win 8

Windows 8 Safety Settings

With the increasing influence of the Internet in our lives, online safety and privacy is becoming a very important topic to ponder upon. It is essential to maintain the privacy online, especially when we are sharing so much of our […]

outlook privacy settings 5

Strengthen Outlook.com Privacy & Security Settings

Outlook.com is one of the best services provided by Microsoft. It offers a secure email service with modern interface and powerful features. Outlook.com respects its users’ privacy and thus it don’t scan the content of your email messages, address book, […]

Misfortune Cookie Vulnerability

Misfortune Cookie Vulnerability: Is your Router affected?

A Router is often the last contact device in a network, that connects the entire network to external networks and the Internet. If the router is somehow compromised, it is easy to compromise all the devices – computers, printers, scanners […]

bundleware

Bundleware: Definition, Prevention, Removal Guide

What does Bundleware mean? Bundleware got its name from people ‘bundling’ different programs into one single installation program. The one installation for bundleware  installs the main program that you want along with some other programs that you do not want. […]

cyber attacks

Cyber Attacks – Definition, Types, Prevention

A Cyber Attack is an attack initiated from a computer against another computer or a website, with a view to compromising the integrity, confidentiality or availability of target and the information stored in it. This article explains what are Cyber […]

  • Recent Comments