Posts under Security category

tor project 1

What is Tor Network and what is it used for?

The Internet is definitely not a secure place for exchanging information. There are many prying eyes on you trying to get a piece of your secret information. In this era of free-flowing data; most of us use the Internet connection […]

Why would someone want to hack my computer

Why would someone want to hack my computer?

In this era of technology, there are many good people trying to create excellent networks to help people like us to communicate, work with others and get information. On the other hand, there are some not-so-good people who for a […]

Prevent Webcam Hacking attacks with Who Stalks My Cam software

Webcam hacking attacks are one of the most popular activities of cyber criminals these days. While hackers have been doing this since ages, Webcam hacking has made headlines recently. DarkComet RAT (Remote Access Trojan) is something used by the hackers […]

MongoDB

How to secure and protect MongoDB database from Ransomware

Ransomware recently struck some unsecured MongoDB installations and held the data to ransom. Here we will see what is MongoDB and take a look at some steps you can take to secure and protect MongoDB database. To begin with, here […]

Windows 10 computer systems help mitigate Zero-Day Exploits

Even before a developer creates a patch for fixing the vulnerability discovered in the app, an attacker releases malware for it. This event is called as Zero-day exploit. Whenever a company’s developers create software or an application, the inherent danger […]

Secure Internet of Things

Secure Internet of Things and IoT devices: PDF Guide

The Internet of Things or IoT has become a buzz word these days. It refers to increased integration of physical world with computer or digital based smart devices. The key feature of this technology is that it can enable communication […]