Posts under Security category

How Windows Defender System Guard works on Windows 10

Windows 10 has made system attacks difficult with the platform integrity becoming more difficult to compromise. The Windows Defender System Guard comes with the Fall Creators Update for Windows 10. The Update reorganized the system integrity features such that it […]

Windows 10 device

Hardware and Firmware Standards for a Secure Windows 10 Device

With regular security updates and enhancements, Microsoft has been extremely proactive trying to keep its devices and the Windows 10 operating system (OS) safe from any sort of threats. Following the same approach, the company has released a set of new instructions […]

Check if your Intel computer is exposed to Vulnerabilities

After findings revealed Intel chips were susceptible to vulnerabilities following a test conducted by researchers, Intel acknowledged the flaw and issued a security advisory. Severity rating that was accorded to the vulnerability was ‘IMPORTANT’. As such, it was essential to […]

Windows Defender Exploit Guard

How to configure Windows Defender Exploit Guard (WDEG) in Windows 10

Windows Defender Exploit Guard runs all the security benefits necessary to keep intrusion threats at bay. A characteristic feature of this tool is ‘Exploit Protection’. It automatically applies to many exploit mitigation techniques. This capability can be tested inside the […]

Network protection windows defender

Windows Defender Network Protection feature in Windows 10

Unlike other cosmetic changes introduced in Windows 10 v1709, Firewall & Network Protection has been the focus of attention. Network Protection, as you are aware helps reduce the attack surface of your devices from Internet-based events. It prevents employees from […]

Exploit Protection in Windows 10

Enable and use Exploit Protection in Windows 10

Windows Defender Security Center in Windows 10 v1709 now introduces a new security protection feature called Exploit Protection, that helps protect your Windows computers from malware that use security exploits to infect your system. It includes mitigations that you can […]

WPA2, WPA, WEP Wi-Fi Protocols

Difference between WPA, WPA2 & WEP Wi-Fi Protocols

There are many inherent risks associated with wireless protocols and encryption methods. So, to minimize them a robust framework of different wireless security protocols is used. These Wireless Security Protocols assure prevention of unauthorized access to computers by encrypting the […]

How to use Controlled Folder Access in Windows 10

How to use Controlled Folder Access in Windows 10

Ransomware is rampant today, and you need to take additional care to secure your Windows computer, apart from just installing an antivirus software. While one can always use an anti-ransomware software, Windows 10 now makes it easier by introducing Controlled Folder […]

RansomSaver for Outlook blocks Ransomware attachment files

Microsoft Outlook is a multi-tasking application. Apart from email management, the service offers a blend of the Calendar, Tasks manager, Contact Manager, Note-taking tools, Journal and other tools. You can enhance the productivity of this application furthermore by installing few […]

Malwarebytes blocks Program or Website

Malwarebytes blocks Program or Website – Add Exclusions

One of the popular programs for silencing and removing malware is Malwarebytes. It’s the perfect tool for any computer user. The free version works quite well too, but just as long as the user performs regular scans of their Windows […]

Bitdefender Ransomware Recognition Tool

Bitdefender Ransomware Recognition Tool will help identify Ransomware

Bitdefender Ransomware Recognition Tool is a free portable software that will help you identify the family & sub-version of the Ransomware which may have infected your Windows computer system and encrypted your data. If your computer has been infected with Ransomware, […]

Block websites from using your CPU to mine Cryptocurrency

Last weekend, The Pirate Bay, a popular torrenting site drew sharp criticism from users as it admitted to hiding details about testing a new service that intentionally used visitors’ CPU power to generate Cryptocurrency profits for itself. Coin Hive, the […]