Posts under Security category

Credential Stuffing Attack

What is a Credential Stuffing Attack

Look around, and you will find abundant stories of Cybercrime flooding the internet World. Attackers are finding newer ways to steal private customer data from businesses and using them for their own financial benefits. The consequences are even worse for […]

Windows Defender Security Center windows 10

Which antivirus software do you recommend for Windows PC?

Installing a good antivirus & keeping your Windows OS & your security software updated at all times helps protect your Windows computer from viruses and other security threats. While Windows Defender on Windows 10/8/7 does a great job; there are […]

Intel Microcode Boot Loader

Protect your motherboard with Intel Microcode Boot Loader

Protecting your computer is a very important task, one that requires your full attention whenever there’s a new vulnerability out in the wild. Now, you may not have known before, but your motherboard can also be affected, so what to […]

Skype virus sending messages automatically

Prevent Skype virus from sending messages automatically

Skype virus is nothing new. It arrived first sveral years back, which was sending Baidu links, followed by Goog.gl links. Then one version sent out fake profile pictures, and there is one which is sending attachments. It’s basically a Windows OS virus […]

Anti-virus

Windows Defender Antivirus now runs in a Sandbox environment

For tech-giants like Microsoft, technology constitutes the core of the business. It has not only helped them make better products over the years but also create a new market. Windows as an operating system revolutionized the software market. Now, they […]

PhishTank report Phishing

PhishTank will help you verify or report Phishing websites

PhishTank is a project from OpenDNS that aids in checking out websites that attempt Phishing. OpenDNS is a service that offers both domain name resolving service as well as blocking websites that are suspected as phishing domains. PhishTank is a […]

cold-boot-attack

What is a Cold Boot Attack: Explanation and Staying Safe

Cold Boot Attack is yet another method used to steal data. The only thing special is that they have direct access to your computer hardware or the whole computer. This article talks about what is Cold Boot Attack and how […]

Firefox Monitor checks if your data was breached

We often get the massive data breach news where millions of accounts get compromised along with their email addresses and passwords. However, we can never know if our email addresses or any other personal details were a part of that […]

05_Revoke app permissions from Microsoft

Remove 3rd-party App access from your online accounts

I was casually going through my Facebook Settings when I noticed that over 80 apps have permissions to use my Facebook data. “Good for them,” I thought to believe more than half of them would be selling off my data […]

What is Microsoft’s Security Servicing Criteria for Windows?

Microsoft is a company that is committed to protecting its customers from vulnerabilities that affect its products, services, and devices. To solve most issues, the software giant tends to release a software update to get the job done, and over […]

Password Spray attack

Password Spray Attack Definition and Defending yourself

The two most common used methods to gain access to unauthorized accounts are (a) Brute Force Attack, and (b) Password Spray Attack. We have explained Brute Force Attacks earlier. This article focuses on Password Spray Attack – what it is […]