Posts under Security category

Malware industry

The Billion Dollar Computer Malware Industry

As scores of people and corporations are lining up their devices on their individual network, the volume of personal and confidential information shared on it has grown to an all-time high. In the pursuit of this information, attackers have taken […]

Cryptojacking

Cryptojacking the new browser mining threat you need to know about

Cryptojacking or malicious cryptomining is a new trick used to mine Cryptocurrencies on a user’s computer using their CPU resources in the background without their knowledge. Typically, the cybercriminal loads a script into the victim’s web browser which contains a […]

Attack Surface Reduction feature in Windows Defender

Attack Surface Reduction is a feature of Windows Defender Exploit Guard that prevent actions that are used by exploit-seeking malware to infect computers. Windows Defender Exploit Guard is a new set of invasion prevention capabilities that Microsoft introduced as a […]

How Windows Defender System Guard works on Windows 10

Windows 10 has made system attacks difficult with the platform integrity becoming more difficult to compromise. The Windows Defender System Guard comes with the Fall Creators Update for Windows 10. The Update reorganized the system integrity features such that it […]

Windows 10 device

Hardware and Firmware Standards for a Secure Windows 10 Device

With regular security updates and enhancements, Microsoft has been extremely proactive trying to keep its devices and the Windows 10 operating system (OS) safe from any sort of threats. Following the same approach, the company has released a set of new instructions […]

Check if your Intel computer is exposed to Vulnerabilities

After findings revealed Intel chips were susceptible to vulnerabilities following a test conducted by researchers, Intel acknowledged the flaw and issued a security advisory. Severity rating that was accorded to the vulnerability was ‘IMPORTANT’. As such, it was essential to […]

Windows Defender Exploit Guard

How to configure Windows Defender Exploit Guard (WDEG) in Windows 10

Windows Defender Exploit Guard runs all the security benefits necessary to keep intrusion threats at bay. A characteristic feature of this tool is ‘Exploit Protection’. It automatically applies to many exploit mitigation techniques. This capability can be tested inside the […]

Network protection windows defender

Windows Defender Network Protection feature in Windows 10

Unlike other cosmetic changes introduced in Windows 10 v1709, Firewall & Network Protection has been the focus of attention. Network Protection, as you are aware helps reduce the attack surface of your devices from Internet-based events. It prevents employees from […]

Exploit Protection in Windows 10

Enable and use Exploit Protection in Windows 10

Windows Defender Security Center in Windows 10 v1709 now introduces a new security protection feature called Exploit Protection, that helps protect your Windows computers from malware that use security exploits to infect your system. It includes mitigations that you can […]

WPA2, WPA, WEP Wi-Fi Protocols

Difference between WPA, WPA2 & WEP Wi-Fi Protocols

There are many inherent risks associated with wireless protocols and encryption methods. So, to minimize them a robust framework of different wireless security protocols is used. These Wireless Security Protocols assure prevention of unauthorized access to computers by encrypting the […]

How to use Controlled Folder Access in Windows 10

How to enable and use Controlled Folder Access in Windows 10

Ransomware is rampant today, and you need to take additional care to secure your Windows computer, apart from just installing an antivirus software. While one can always use an anti-ransomware software, Windows 10 now makes it easier by introducing Controlled Folder […]

RansomSaver for Outlook blocks Ransomware attachment files

Microsoft Outlook is a multi-tasking application. Apart from email management, the service offers a blend of the Calendar, Tasks manager, Contact Manager, Note-taking tools, Journal and other tools. You can enhance the productivity of this application furthermore by installing few […]