Posts under Security category

Masking Email Address

Benefits of Masking Email Address

Certain websites ask you for your email address for different activities. For entering a comment, for example, you have to provide your email ID. Likewise, when downloading some free e-book, they ask you for your email ID, so that they […]

Windows 10

Device Guard in Windows 10 keeps malware away

Device Guard in Windows 10 is a firmware that will not let un-authenticated, unsigned, unauthorized programs as well as operating systems to load. We have already talked how we need an operating system that performs self-checks on what all is […]

Windows Defender PC status Potentially unprotected 1

Windows Defender PC status – Potentially unprotected

At times, you may find a small icon appearing in the lower-right hand corner of your Windows computer screen, flashing a Potentially Unprotected warning or a Computer at risk warning. You may wonder why this problem shows up, even when […]

DLL Hijacking

DLL Hijacking Vulnerability Attacks, Prevention & Detection

DLL stands for Dynamic Link Libraries and are external parts of applications that run on Windows or any other operating systems. Most applications are not complete in themselves and store code in different files. If there is need for the […]

Eset Superfish cleaner

ESET Standalone Superfish Adware Cleaner available

ESET Security has released a free standalone Superfish adware removal tool for Windows users. If you recollect, Superfish was recently in the news, after it was found that this adware came pre-installed on Lenovo laptops. ESET Superfish Cleaner Tool The Superfish […]

Brute Force Attacks

Brute Force Attacks – Definition and Prevention

There are many methods hackers use to get into a computer, computer network, a website or an online service. Carrying out a Brute Force Attack is one of them. It is one of the simplest, yet time consuming method to hack […]

Intrusion Detection and Prevention software

3 Free Intrusion Detection and Prevention software for Windows

Cyber criminals are working hard these days to gain access to your business and home networks and it therefore becomes imperative that you take all possible steps to secure your Windows system. If you have an Intrusion Detection Software (IDS) […]

zero-day-attack

What does Zero Day attack, exploit, or vulnerability mean

We often hear of Zero Day attacks, vulnerabilities or exploits. We have also heard of Zero Day patches. This article helps you know what is a Zero Day attack, exploit, or vulnerability. Zero Day attacks generally refer to attacks on […]

DNS Cache Poisoning and Spoofing

DNS Cache Poisoning and Spoofing

DNS stands for Domain Name System, and this helps a browser in figuring out the IP address of a website so that it can load it on your computer. DNS cache is a file on your or your ISP’s computer […]

Online Safety Tips for Kids, Students and Teens

Online Safety Tips for Kids, Students and Teens

If a computer is not connected to the Internet, it is not considered usable by many. What started as a small networking protocol has got everyone addicted to the Internet. With the increase in social networking sites, more and more […]

Windows 8 Safety Settings

With the increasing influence of the Internet in our lives, online safety and privacy is becoming a very important topic to ponder upon. It is essential to maintain the privacy online, especially when we are sharing so much of our […]

Strengthen Outlook.com Privacy & Security Settings

Outlook.com is one of the best services provided by Microsoft. It offers a secure email service with modern interface and powerful features. Outlook.com respects its users’ privacy and thus it don’t scan the content of your email messages, address book, […]

Misfortune Cookie Vulnerability

Misfortune Cookie Vulnerability: Is your Router affected?

A Router is often the last contact device in a network, that connects the entire network to external networks and the Internet. If the router is somehow compromised, it is easy to compromise all the devices – computers, printers, scanners […]